· 6 years ago · Dec 22, 2019, 08:48 PM
1######################################################################################################################################
2======================================================================================================================================
3Hostname tec.cl ISP Microsoft Corporation
4Continent North America Flag
5US
6Country United States Country Code US
7Region Iowa Local time 22 Dec 2019 13:55 CST
8City Des Moines Postal Code 50307
9IP Address 104.43.254.102 Latitude 41.601
10 Longitude -93.611
11=======================================================================================================================================
12#######################################################################################################################################
13> tec.cl
14Server: 38.132.106.139
15Address: 38.132.106.139#53
16
17Non-authoritative answer:
18Name: tec.cl
19Address: 104.43.254.102
20>
21#######################################################################################################################################
22Domain name: tec.cl
23Registrant name: TEC HARSEIM LTDA
24Registrant organisation:
25Registrar name: NIC Chile
26Registrar URL: https://www.nic.cl
27Creation date: 2009-10-14 12:49:56 CLST
28Expiration date: 2023-09-14 13:30:04 CLST
29Name server: ns1-05.azure-dns.com
30Name server: ns2-05.azure-dns.net
31Name server: ns3-05.azure-dns.org
32Name server: ns4-05.azure-dns.info
33#######################################################################################################################################
34[+] IP Address : 104.43.254.102
35
36[+] Headers :
37
38[+] Cache-Control : private
39[+] Content-Length : 5292
40[+] Content-Type : text/html; charset=utf-8
41[+] Content-Encoding : gzip
42[+] Vary : Accept-Encoding
43[+] Server : Microsoft-IIS/10.0
44[+] Set-Cookie : cmssystemLanguage=es; expires=Tue, 22-Dec-2020 20:00:05 GMT; path=/; secure; HttpOnly, ASP.NET_SessionId=hwmqy01iziccyx1jlb2uwgog; path=/; secure; HttpOnly
45[+] X-AspNet-Version : 4.0.30319
46[+] X-Frame-Options : SAMEORIGIN
47[+] X-Powered-By : ASP.NET
48[+] Date : Sun, 22 Dec 2019 20:00:06 GMT
49
50[+] SSL Certificate Information :
51
52[+] organizationalUnitName : Domain Control Validated
53[+] commonName : tec.cl
54[+] countryName : US
55[+] stateOrProvinceName : Arizona
56[+] localityName : Scottsdale
57[+] organizationName : GoDaddy.com, Inc.
58[+] organizationalUnitName : http://certs.godaddy.com/repository/
59[+] commonName : Go Daddy Secure Certificate Authority - G2
60[+] Version : 3
61[+] Serial Number : 188AD2DE6286EEE2
62[+] Not Before : Mar 24 16:11:13 2019 GMT
63[+] Not After : Mar 24 16:11:13 2020 GMT
64[+] OCSP : ('http://ocsp.godaddy.com/',)
65[+] subject Alt Name : (('DNS', 'tec.cl'), ('DNS', 'www.tec.cl'))
66[+] CA Issuers : ('http://certificates.godaddy.com/repository/gdig2.crt',)
67[+] CRL Distribution Points : ('http://crl.godaddy.com/gdig2s1-1008.crl',)
68
69[+] Whois Lookup :
70
71[+] NIR : None
72[+] ASN Registry : arin
73[+] ASN : 8075
74[+] ASN CIDR : 104.40.0.0/13
75[+] ASN Country Code : US
76[+] ASN Date : 2014-05-07
77[+] ASN Description : MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US
78[+] cidr : 104.40.0.0/13
79[+] name : MSFT
80[+] handle : NET-104-40-0-0-1
81[+] range : 104.40.0.0 - 104.47.255.255
82[+] description : Microsoft Corporation
83[+] country : US
84[+] state : WA
85[+] city : Redmond
86[+] address : One Microsoft Way
87[+] postal_code : 98052
88[+] emails : ['msndcc@microsoft.com', 'IOC@microsoft.com', 'abuse@microsoft.com']
89[+] created : 2014-05-07
90[+] updated : 2014-05-07
91
92[+] Crawling Target...
93
94[+] Looking for robots.txt........[ Not Found ]
95[+] Looking for sitemap.xml.......[ Not Found ]
96[+] Extracting CSS Links..........[ 3 ]
97[+] Extracting Javascript Links...[ 6 ]
98[+] Extracting Internal Links.....[ 4 ]
99[+] Extracting External Links.....[ 0 ]
100[+] Extracting Images.............[ 1 ]
101
102[+] Total Links Extracted : 14
103
104[+] Dumping Links in /opt/FinalRecon/dumps/tec.cl.dump
105[+] Completed!
106#######################################################################################################################################
107[i] Scanning Site: http://tec.cl
108
109
110
111B A S I C I N F O
112====================
113
114
115[+] Site Title:
116 TEC HARSEIM | Login / Registracija
117
118[+] IP address: 104.43.254.102
119[+] Web Server: Microsoft-IIS/10.0
120[+] CMS: Could Not Detect
121[+] Cloudflare: Not Detected
122[+] Robots File: Could NOT Find robots.txt!
123
124
125
126
127W H O I S L O O K U P
128========================
129
130 %%
131%% This is the NIC Chile Whois server (whois.nic.cl).
132%%
133%% Rights restricted by copyright.
134%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
135%%
136
137Domain name: tec.cl
138Registrant name: TEC HARSEIM LTDA
139Registrant organisation:
140Registrar name: NIC Chile
141Registrar URL: https://www.nic.cl
142Creation date: 2009-10-14 12:49:56 CLST
143Expiration date: 2023-09-14 13:30:04 CLST
144Name server: ns1-05.azure-dns.com
145Name server: ns2-05.azure-dns.net
146Name server: ns3-05.azure-dns.org
147Name server: ns4-05.azure-dns.info
148
149%%
150%% For communication with domain contacts please use website.
151%% See https://www.nic.cl/registry/Whois.do?d=tec.cl
152%%
153
154
155
156
157G E O I P L O O K U P
158=========================
159
160[i] IP Address: 104.43.254.102
161[i] Country: United States
162[i] State: Iowa
163[i] City: Des Moines
164[i] Latitude: 41.6006
165[i] Longitude: -93.6112
166
167
168
169
170H T T P H E A D E R S
171=======================
172
173
174[i] HTTP/1.1 301 Moved Permanently
175[i] Content-Length: 148
176[i] Content-Type: text/html; charset=UTF-8
177[i] Location: http://tec.cl/log-in.aspx
178[i] Server: Microsoft-IIS/10.0
179[i] X-Powered-By: ASP.NET
180[i] Date: Sun, 22 Dec 2019 20:00:23 GMT
181[i] Connection: close
182[i] HTTP/1.1 303 See Other
183[i] Content-Length: 149
184[i] Content-Type: text/html; charset=UTF-8
185[i] Location: https://tec.cl/log-in.aspx
186[i] Server: Microsoft-IIS/10.0
187[i] X-Powered-By: ASP.NET
188[i] Date: Sun, 22 Dec 2019 20:00:24 GMT
189[i] Connection: close
190[i] HTTP/1.1 200 OK
191[i] Cache-Control: private
192[i] Content-Length: 13886
193[i] Content-Type: text/html; charset=utf-8
194[i] Server: Microsoft-IIS/10.0
195[i] Set-Cookie: cmssystemLanguage=es; expires=Tue, 22-Dec-2020 20:00:24 GMT; path=/; secure; HttpOnly
196[i] Set-Cookie: ASP.NET_SessionId=ztwzpf0shrof32t1o2nxppl2; path=/; secure; HttpOnly
197[i] X-AspNet-Version: 4.0.30319
198[i] X-Frame-Options: SAMEORIGIN
199[i] X-Powered-By: ASP.NET
200[i] Date: Sun, 22 Dec 2019 20:00:24 GMT
201[i] Connection: close
202
203
204
205
206D N S L O O K U P
207===================
208
209tec.cl. 3599 IN A 104.43.254.102
210tec.cl. 21599 IN NS ns1-05.azure-dns.com.
211tec.cl. 21599 IN NS ns2-05.azure-dns.net.
212tec.cl. 21599 IN NS ns3-05.azure-dns.org.
213tec.cl. 21599 IN NS ns4-05.azure-dns.info.
214tec.cl. 3599 IN SOA ns1-05.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
215tec.cl. 3599 IN MX 0 tec-cl.mail.protection.outlook.com.
216tec.cl. 3599 IN TXT "v=spf1 a mx include:spf.protection.outlook.com include:srs.bis.na.blackberry.com include:srs.bis.eu.blackberry.com ~all"
217tec.cl. 3599 IN TXT "tecadmin.azurewebsites.net"
218tec.cl. 3599 IN TXT "3cjt7cfhn3k97585catcs9ed2i"
219tec.cl. 3599 IN TXT "google-site-verification=L15M_QvsR5HbeVDE2a6eVhOvTaQ6FglEzjjqSgzIlag"
220
221
222
223
224S U B N E T C A L C U L A T I O N
225====================================
226
227Address = 104.43.254.102
228Network = 104.43.254.102 / 32
229Netmask = 255.255.255.255
230Broadcast = not needed on Point-to-Point links
231Wildcard Mask = 0.0.0.0
232Hosts Bits = 0
233Max. Hosts = 1 (2^0 - 0)
234Host Range = { 104.43.254.102 - 104.43.254.102 }
235
236
237
238N M A P P O R T S C A N
239============================
240
241Starting Nmap 7.70 ( https://nmap.org ) at 2019-12-22 20:00 UTC
242Nmap scan report for tec.cl (104.43.254.102)
243Host is up (0.035s latency).
244
245PORT STATE SERVICE
24621/tcp filtered ftp
24722/tcp filtered ssh
24823/tcp filtered telnet
24980/tcp open http
250110/tcp filtered pop3
251143/tcp filtered imap
252443/tcp open https
2533389/tcp filtered ms-wbt-server
254
255Nmap done: 1 IP address (1 host up) scanned in 1.52 seconds
256#######################################################################################################################################
257[+] Starting At 2019-12-22 15:00:27.488845
258[+] Collecting Information On: https://tec.cl/log-in.aspx
259[#] Status: 200
260--------------------------------------------------
261[#] Web Server Detected: Microsoft-IIS/10.0
262[#] X-Powered-By: ASP.NET
263- Cache-Control: private
264- Content-Length: 6589
265- Content-Type: text/html; charset=utf-8
266- Content-Encoding: gzip
267- Vary: Accept-Encoding
268- Server: Microsoft-IIS/10.0
269- Set-Cookie: cmssystemLanguage=es; expires=Tue, 22-Dec-2020 20:00:28 GMT; path=/; secure; HttpOnly, ASP.NET_SessionId=4ovcbw43gb0bw243jgq35qrf; path=/; secure; HttpOnly
270- X-AspNet-Version: 4.0.30319
271- X-Frame-Options: SAMEORIGIN
272- X-Powered-By: ASP.NET
273- Date: Sun, 22 Dec 2019 20:00:28 GMT
274--------------------------------------------------
275[#] Finding Location..!
276[#] status: success
277[#] country: United States
278[#] countryCode: US
279[#] region: IA
280[#] regionName: Iowa
281[#] city: Des Moines
282[#] zip: 50309
283[#] lat: 41.5908
284[#] lon: -93.6208
285[#] timezone: America/Chicago
286[#] isp: Microsoft Corporation
287[#] org: Microsoft Azure App Service (centralus)
288[#] as: AS8075 Microsoft Corporation
289[#] query: 104.43.254.102
290--------------------------------------------------
291[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
292--------------------------------------------------
293[#] Starting Reverse DNS
294[-] Failed ! Fail
295--------------------------------------------------
296[!] Scanning Open Port
297[#] 80/tcp open http
298[#] 443/tcp open https
299--------------------------------------------------
300[+] Collecting Information Disclosure!
301[#] Detecting sitemap.xml file
302[-] sitemap.xml file not Found!?
303[#] Detecting robots.txt file
304[-] robots.txt file not Found!?
305[#] Detecting GNU Mailman
306[-] GNU Mailman App Not Detected!?
307--------------------------------------------------
308[+] Crawling Url Parameter On: https://tec.cl/log-in.aspx
309--------------------------------------------------
310[#] Searching Html Form !
311[-] No Html Form Found!?
312--------------------------------------------------
313[-] No DOM Paramter Found!?
314--------------------------------------------------
315[!] 1 Internal Dynamic Parameter Discovered
316[+] https://tec.cl/log-in.aspx/templates/B2B/skins/main/cashed-skin.css?
317--------------------------------------------------
318[!] 1 External Dynamic Parameter Discovered
319[#] https://fonts.googleapis.com/css?family=Roboto:300,400,500,600,700
320--------------------------------------------------
321[!] 12 Internal links Discovered
322[+] https://tec.cl/log-in.aspx/App_Themes/main/CMSAdmin.css
323[+] https://tec.cl/log-in.aspx///tec.cl/cdn/v7/ProductionContentVirtual.css
324[+] https://tec.cl/log-in.aspx/App_Themes/main/CMSAdmin.css
325[+] https://tec.cl/log-in.aspx//assets/tec.cl/favicon.ico
326[+] https://tec.cl/log-in.aspx/javascript:WebForm_DoPostBackWithOptions(new WebForm_PostBackOptions("ctl00$ctl00$CMSWebPartManager$Login1$Login$ctl00$btnLogin", "", true, "LoginForm", "", false, true))
327[+] https://tec.cl/log-in.aspx/reiniciar-clave.aspx
328[+] https://tec.cl/log-in.aspx/contacto.aspx
329[+] https://tec.cl/log-in.aspx//Assets/tec.cl/Uploads/TEC_CAZA_2019_cliente_media.pdf
330[+] https://tec.cl/log-in.aspx//Assets/tec.cl/Uploads/TEC_CAZA_2019_cliente_media.zip
331[+] https://tec.cl/log-in.aspx//Assets/tec.cl/Uploads/TEC_PESCA_2019.pdf
332[+] https://tec.cl/log-in.aspx//Assets/tec.cl/Uploads/TEC_PESCA_2019.zip
333[+] https://tec.cl/log-in.aspx//politicasdeprivacidad.aspx
334--------------------------------------------------
335[-] No External Link Found!?
336--------------------------------------------------
337[#] Mapping Subdomain..
338[!] Found 1 Subdomain
339- tec.cl
340--------------------------------------------------
341[!] Done At 2019-12-22 15:00:48.671423
342#######################################################################################################################################
343[INFO] ------TARGET info------
344[*] TARGET: https://tec.cl/log-in.aspx
345[*] TARGET IP: 104.43.254.102
346[INFO] NO load balancer detected for tec.cl...
347[*] DNS servers: ns1-05.azure-dns.com.
348[*] TARGET server: Microsoft-IIS/10.0
349[*] CC: US
350[*] Country: United States
351[*] RegionCode: IA
352[*] RegionName: Iowa
353[*] City: Des Moines
354[*] ASN: AS8075
355[*] BGP_PREFIX: 104.40.0.0/13
356[*] ISP: MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US
357[INFO] SSL/HTTPS certificate detected
358[*] Issuer: issuer=C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certs.godaddy.com/repository/, CN = Go Daddy Secure Certificate Authority - G2
359[*] Subject: subject=OU = Domain Control Validated, CN = tec.cl
360[INFO] DNS enumeration:
361[*] admin.tec.cl tecadmin.azurewebsites.net. waws-prod-dm1-103.sip.azurewebsites.windows.net. waws-prod-dm1-103.cloudapp.net. 104.43.254.102
362[*] mail.tec.cl autodiscover.outlook.com. autod.ha-autod.office.com. 52.96.22.184 40.97.96.8 40.97.120.152 40.97.120.184 52.96.22.8 40.97.92.40 40.97.121.40 40.97.120.232
363[INFO] Possible abuse mails are:
364[*] abuse@tec.cl
365[*] report_spam@hotmail.com
366[INFO] NO PAC (Proxy Auto Configuration) file FOUND
367[INFO] Starting FUZZing in http://tec.cl/FUzZzZzZzZz...
368[INFO] Status code Folders
369[ALERT] Look in the source code. It may contain passwords
370[ALERT] Content in http://tec.cl/ AND http://www.tec.cl/ is different
371[INFO] MD5 for http://tec.cl/ is: b12d371a7b7943ba88c8654244cf01e3
372[INFO] MD5 for http://www.tec.cl/ is: 705d8c1c1bad1a2e6640741c7389e7ac
373[INFO] http://tec.cl/ redirects to https://tec.cl/log-in.aspx
374[INFO] http://www.tec.cl/ redirects to https://tec.cl/log-in.aspx
375[INFO] Links found from https://tec.cl/log-in.aspx http://104.43.254.102/:
376[*] https://blogs.msdn.microsoft.com/appserviceteam/2017/08/08/faq-app-service-domain-preview-and-custom-domains/
377[*] https://docs.microsoft.com/en-us/azure/app-service-web/app-service-web-tutorial-custom-domain
378[*] https://e.issuu.com/embed.html?d=tec_pesca_2019&u=techarseim
379[*] https://tec.cl/Assets/tec.cl/Uploads/TEC_CAZA_2019_cliente_media.pdf
380[*] https://tec.cl/Assets/tec.cl/Uploads/TEC_CAZA_2019_cliente_media.zip
381[*] https://tec.cl/Assets/tec.cl/Uploads/TEC_PESCA_2019.pdf
382[*] https://tec.cl/Assets/tec.cl/Uploads/TEC_PESCA_2019.zip
383[*] https://tec.cl/contacto.aspx
384[*] https://tec.cl/politicasdeprivacidad.aspx
385[*] https://tec.cl/reiniciar-clave.aspx
386cut: intervalle de champ incorrecte
387Saisissez « cut --help » pour plus d'informations.
388[INFO] BING shows 104.43.254.102 is shared with 15,400 hosts/vhosts
389[INFO] Shodan detected the following opened ports on 104.43.254.102:
390[*] 443
391[*] 80
392[INFO] ------VirusTotal SECTION------
393[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
394[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
395[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
396[INFO] ------Alexa Rank SECTION------
397[INFO] Percent of Visitors Rank in Country:
398[INFO] Percent of Search Traffic:
399[INFO] Percent of Unique Visits:
400[INFO] Total Sites Linking In:
401[*] Total Sites
402[INFO] Useful links related to tec.cl - 104.43.254.102:
403[*] https://www.virustotal.com/pt/ip-address/104.43.254.102/information/
404[*] https://www.hybrid-analysis.com/search?host=104.43.254.102
405[*] https://www.shodan.io/host/104.43.254.102
406[*] https://www.senderbase.org/lookup/?search_string=104.43.254.102
407[*] https://www.alienvault.com/open-threat-exchange/ip/104.43.254.102
408[*] http://pastebin.com/search?q=104.43.254.102
409[*] http://urlquery.net/search.php?q=104.43.254.102
410[*] http://www.alexa.com/siteinfo/tec.cl
411[*] http://www.google.com/safebrowsing/diagnostic?site=tec.cl
412[*] https://censys.io/ipv4/104.43.254.102
413[*] https://www.abuseipdb.com/check/104.43.254.102
414[*] https://urlscan.io/search/#104.43.254.102
415[*] https://github.com/search?q=104.43.254.102&type=Code
416[INFO] Useful links related to AS8075 - 104.40.0.0/13:
417[*] http://www.google.com/safebrowsing/diagnostic?site=AS:8075
418[*] https://www.senderbase.org/lookup/?search_string=104.40.0.0/13
419[*] http://bgp.he.net/AS8075
420[*] https://stat.ripe.net/AS8075
421[INFO] Date: 22/12/19 | Time: 15:02:15
422[INFO] Total time: 1 minute(s) and 43 second(s)
423#######################################################################################################################################
424Trying "tec.cl"
425Trying "tec.cl"
426;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27846
427;; flags: qr rd ra; QUERY: 1, ANSWER: 11, AUTHORITY: 0, ADDITIONAL: 4
428
429;; QUESTION SECTION:
430;tec.cl. IN ANY
431
432;; ANSWER SECTION:
433tec.cl. 3600 IN TXT "v=spf1 a mx include:spf.protection.outlook.com include:srs.bis.na.blackberry.com include:srs.bis.eu.blackberry.com ~all"
434tec.cl. 3600 IN TXT "tecadmin.azurewebsites.net"
435tec.cl. 3600 IN TXT "3cjt7cfhn3k97585catcs9ed2i"
436tec.cl. 3600 IN TXT "google-site-verification=L15M_QvsR5HbeVDE2a6eVhOvTaQ6FglEzjjqSgzIlag"
437tec.cl. 3600 IN MX 0 tec-cl.mail.protection.outlook.com.
438tec.cl. 3600 IN SOA ns1-05.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
439tec.cl. 3600 IN A 104.43.254.102
440tec.cl. 3600 IN NS ns3-05.azure-dns.org.
441tec.cl. 3600 IN NS ns4-05.azure-dns.info.
442tec.cl. 3600 IN NS ns2-05.azure-dns.net.
443tec.cl. 3600 IN NS ns1-05.azure-dns.com.
444
445;; ADDITIONAL SECTION:
446ns1-05.azure-dns.com. 34783 IN AAAA 2603:1061::5
447ns2-05.azure-dns.net. 22482 IN AAAA 2620:1ec:8ec::5
448ns1-05.azure-dns.com. 24388 IN A 40.90.4.5
449ns2-05.azure-dns.net. 22482 IN A 64.4.48.5
450
451Received 669 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 48 ms
452#######################################################################################################################################
453; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace tec.cl any
454;; global options: +cmd
455. 83139 IN NS a.root-servers.net.
456. 83139 IN NS m.root-servers.net.
457. 83139 IN NS j.root-servers.net.
458. 83139 IN NS g.root-servers.net.
459. 83139 IN NS k.root-servers.net.
460. 83139 IN NS c.root-servers.net.
461. 83139 IN NS i.root-servers.net.
462. 83139 IN NS l.root-servers.net.
463. 83139 IN NS d.root-servers.net.
464. 83139 IN NS h.root-servers.net.
465. 83139 IN NS b.root-servers.net.
466. 83139 IN NS e.root-servers.net.
467. 83139 IN NS f.root-servers.net.
468. 83139 IN RRSIG NS 8 0 518400 20200104170000 20191222160000 22545 . rp497hRcprLJYhhPTR3eu85qHGrdQoxpqUwPczkC3EQNOtd/pN47thvC s5AySD3CeOinJP9owxIkhm0uxqlFMPND76fAkIa8ddA/g9aBtqFX/0UI 1LxoFVKm8e6C2+Vw4hamNElgySGG5vPmUyWxUVGQSRsegfHaThnL9tuL AqPJxGQL5ixhKXSjujODVebxHYX+1Lzr10NJNys6jK6x96HxnFHp5cBO Zy7GR2c0TgBcV+8ToBL2st9AJMxewZS71ecg0ASVTXboY6nDrNu+SdeI J46rYkkUauTszMwHmwNIcq4KsDFjLFsR80O4Loa2Fk1BB+CS6w0TMAM0 MZfGfg==
469;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 127 ms
470
471cl. 172800 IN NS a.nic.cl.
472cl. 172800 IN NS cl-ns.anycast.pch.net.
473cl. 172800 IN NS cl2-tld.d-zone.ca.
474cl. 172800 IN NS b.nic.cl.
475cl. 172800 IN NS c.nic.cl.
476cl. 172800 IN NS cl1-tld.d-zone.ca.
477cl. 172800 IN NS cl1.dnsnode.net.
478cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
479cl. 86400 IN RRSIG DS 8 1 86400 20200104170000 20191222160000 22545 . Kpzr3iyvPdRJw+V4EYoE54ubHnA9Zw8D4YUwIa2NjVj5D0a5giEFFBEj 5cRrO88SGg+l6/DkQ2+pLJMcXwtRXtvSKWYcK/hsbu4Rmg6pOFb3AwLk YAR54Ix7aa4i5/wMvh5jPeeUaRqfkR8PRA9E8oY4IaLVizdEv+xqd4Ag /uTn8C9nkmYAZ7gOgEFJaF9JiOj7AnrF23w/8WxhnZhTbOYS4oIoT+xo plhn9LEwDWCeG+GsrKhkbFuSn5QOiy7w0lh6ZiiJg0iYFpFe0ov/KHFA CQfyLjv1NT57UbBGjCOFuy0gS39cdPpIpci9RHGuCNWsOhlcSolP08A6 5JcFGw==
480;; Received 816 bytes from 192.36.148.17#53(i.root-servers.net) in 166 ms
481
482tec.cl. 3600 IN NS ns4-05.azure-dns.info.
483tec.cl. 3600 IN NS ns1-05.azure-dns.com.
484tec.cl. 3600 IN NS ns2-05.azure-dns.net.
485tec.cl. 3600 IN NS ns3-05.azure-dns.org.
486A2FEC1SM8V6SSLONPF8UOVUO609CSQ57.cl. 900 IN NSEC3 1 1 2 0D8164F2625F6C3B28F87AD62299F6C5 A8OG81CP44TJD461QCLCK1AE27Q3U58C NS SOA TXT RRSIG DNSKEY NSEC3PARAM
487A2FEC1SM8V6SSLONPF8UOVUO609CSQ57.cl. 900 IN RRSIG NSEC3 8 2 900 20200203030425 20191222190025 12363 cl. MxTQ6xYxbP1eVOTwvc72jDRgAavTq8NPBhDsB8Fbhtcqj6QTf3DzoJF4 u888HQAyW+wRF1ixe1rHNbAE/iRwqe7iYNPERLltUtDH/doWd52PdAVe t7fOuNiC7D1MU581RFWPSr2clKOrfdVh/1py+RJTLBN6w8U0wlmL6k6u zDw=
488Q0VUC5LVVUD711RI6FOMKUL7T5AJIH6B.cl. 900 IN NSEC3 1 1 2 0D8164F2625F6C3B28F87AD62299F6C5 QF783A4SJVMVKRER2EEJMVFPFCK38NA4 NS DS RRSIG
489Q0VUC5LVVUD711RI6FOMKUL7T5AJIH6B.cl. 900 IN RRSIG NSEC3 8 2 900 20200202122711 20191222190025 12363 cl. fREE7GQYNzW5x4Zx+7EDDRcqp8TasUud4XLhqsva6aLYcEZJrhYXJOWv /qhqMdLfEgIcTvhwJV68jUv7Nf32VMIXo+SQsX7yL8RHBLGhos81SBZ2 kw394uB38Iie+DAoJKvg5KnHNNI1BH3ATAmC/Kpdzgg6zdJ8IvuD/GcK X/0=
490;; Received 715 bytes from 204.61.216.30#53(cl-ns.anycast.pch.net) in 116 ms
491
492tec.cl. 3600 IN A 104.43.254.102
493tec.cl. 172800 IN NS ns1-05.azure-dns.com.
494tec.cl. 172800 IN NS ns2-05.azure-dns.net.
495tec.cl. 172800 IN NS ns3-05.azure-dns.org.
496tec.cl. 172800 IN NS ns4-05.azure-dns.info.
497tec.cl. 3600 IN SOA ns1-05.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
498tec.cl. 3600 IN MX 0 tec-cl.mail.protection.outlook.com.
499tec.cl. 3600 IN TXT "v=spf1 a mx include:spf.protection.outlook.com include:srs.bis.na.blackberry.com include:srs.bis.eu.blackberry.com ~all"
500tec.cl. 3600 IN TXT "tecadmin.azurewebsites.net"
501tec.cl. 3600 IN TXT "3cjt7cfhn3k97585catcs9ed2i"
502tec.cl. 3600 IN TXT "google-site-verification=L15M_QvsR5HbeVDE2a6eVhOvTaQ6FglEzjjqSgzIlag"
503;; Received 592 bytes from 2603:1061::5#53(ns1-05.azure-dns.com) in 46 ms
504#######################################################################################################################################
505[*] Performing General Enumeration of Domain: tec.cl
506[-] DNSSEC is not configured for tec.cl
507[*] SOA ns1-05.azure-dns.com 40.90.4.5
508[*] NS ns2-05.azure-dns.net 64.4.48.5
509[*] NS ns2-05.azure-dns.net 2620:1ec:8ec::5
510[*] NS ns4-05.azure-dns.info 13.107.160.5
511[*] NS ns4-05.azure-dns.info 2620:1ec:bda::5
512[*] NS ns3-05.azure-dns.org 13.107.24.5
513[*] NS ns3-05.azure-dns.org 2a01:111:4000::5
514[*] NS ns1-05.azure-dns.com 40.90.4.5
515[*] NS ns1-05.azure-dns.com 2603:1061::5
516[*] MX tec-cl.mail.protection.outlook.com 104.47.70.110
517[*] MX tec-cl.mail.protection.outlook.com 104.47.58.110
518[*] A tec.cl 104.43.254.102
519[*] TXT tec.cl v=spf1 a mx include:spf.protection.outlook.com include:srs.bis.na.blackberry.com include:srs.bis.eu.blackberry.com ~all
520[*] TXT tec.cl tecadmin.azurewebsites.net
521[*] TXT tec.cl google-site-verification=L15M_QvsR5HbeVDE2a6eVhOvTaQ6FglEzjjqSgzIlag
522[*] TXT tec.cl 3cjt7cfhn3k97585catcs9ed2i
523[*] Enumerating SRV Records
524[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 52.112.67.51 443 1
525[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:a::b 443 1
526[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:7::b 443 1
527[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:4::b 443 1
528[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037::b 443 1
529[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:2::b 443 1
530[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:c::f 443 1
531[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:5::b 443 1
532[*] SRV _sip._tls.tec.cl sipdir.online.lync.com 2603:1037:0:e::f 443 1
533[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 52.112.65.75 5061 1
534[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:9::b 5061 1
535[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:c::f 5061 1
536[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:7::b 5061 1
537[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:5::b 5061 1
538[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:a::b 5061 1
539[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:2::b 5061 1
540[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037::b 5061 1
541[*] SRV _sipfederationtls._tcp.tec.cl sipfed.online.lync.com 2603:1037:0:e::f 5061 1
542[+] 18 Records Found
543#######################################################################################################################################
544[*] Processing domain tec.cl
545[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
546[+] Getting nameservers
54764.4.48.5 - ns2-05.azure-dns.net
54813.107.160.5 - ns4-05.azure-dns.info
54913.107.24.5 - ns3-05.azure-dns.org
55040.90.4.5 - ns1-05.azure-dns.com
551[-] Zone transfer failed
552
553[+] TXT records found
554"v=spf1 a mx include:spf.protection.outlook.com include:srs.bis.na.blackberry.com include:srs.bis.eu.blackberry.com ~all"
555"tecadmin.azurewebsites.net"
556"google-site-verification=L15M_QvsR5HbeVDE2a6eVhOvTaQ6FglEzjjqSgzIlag"
557"3cjt7cfhn3k97585catcs9ed2i"
558
559[+] MX records found, added to target list
5600 tec-cl.mail.protection.outlook.com.
561
562[*] Scanning tec.cl for A records
563104.43.254.102 - tec.cl
564104.43.254.102 - admin.tec.cl
56540.97.120.56 - autodiscover.tec.cl
56640.97.121.24 - autodiscover.tec.cl
56740.97.120.248 - autodiscover.tec.cl
56852.96.16.168 - autodiscover.tec.cl
56952.96.10.248 - autodiscover.tec.cl
57040.97.120.72 - autodiscover.tec.cl
57140.97.212.8 - autodiscover.tec.cl
57240.97.120.152 - autodiscover.tec.cl
573104.43.254.102 - b2b.tec.cl
57413.82.96.212 - enterpriseenrollment.tec.cl
57523.101.163.232 - enterpriseregistration.tec.cl
57652.112.65.206 - lyncdiscover.tec.cl
57740.97.212.8 - mail.tec.cl
57852.96.16.168 - mail.tec.cl
57940.97.120.56 - mail.tec.cl
58040.97.121.24 - mail.tec.cl
58140.97.120.248 - mail.tec.cl
58240.97.120.152 - mail.tec.cl
58340.97.120.72 - mail.tec.cl
58452.96.10.248 - mail.tec.cl
58552.112.67.51 - sip.tec.cl
586104.43.254.102 - www.tec.cl
587######################################################################################################################################
588
589 AVAILABLE PLUGINS
590 -----------------
591
592 FallbackScsvPlugin
593 CertificateInfoPlugin
594 OpenSslCipherSuitesPlugin
595 HeartbleedPlugin
596 CompressionPlugin
597 RobotPlugin
598 OpenSslCcsInjectionPlugin
599 HttpHeadersPlugin
600 SessionRenegotiationPlugin
601 SessionResumptionPlugin
602 EarlyDataPlugin
603
604
605
606 CHECKING HOST(S) AVAILABILITY
607 -----------------------------
608
609 104.43.254.102:443 => 104.43.254.102
610
611
612
613
614 SCAN RESULTS FOR 104.43.254.102:443 - 104.43.254.102
615 ----------------------------------------------------
616
617 * TLSV1_3 Cipher Suites:
618 Server rejected all cipher suites.
619
620 * Session Renegotiation:
621 Client-initiated Renegotiation: OK - Rejected
622 Secure Renegotiation: OK - Supported
623
624 * TLS 1.2 Session Resumption Support:
625 With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
626 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
627
628 * Certificate Information:
629 Content
630 SHA1 Fingerprint: 398e01a50c668a74f0104a836015a26e21554cce
631 Common Name: *.azurewebsites.net
632 Issuer: Microsoft IT TLS CA 5
633 Serial Number: 1003537452960863138147407004506388215630627929
634 Not Before: 2019-09-24 02:18:56
635 Not After: 2021-09-24 02:18:56
636 Signature Algorithm: sha256
637 Public Key Algorithm: RSA
638 Key Size: 2048
639 Exponent: 65537 (0x10001)
640 DNS Subject Alternative Names: ['*.azurewebsites.net', '*.scm.azurewebsites.net', '*.azure-mobile.net', '*.scm.azure-mobile.net', '*.sso.azurewebsites.net']
641
642 Trust
643 Hostname Validation: FAILED - Certificate does NOT match 104.43.254.102
644 Android CA Store (9.0.0_r9): OK - Certificate is trusted
645 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
646 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
647 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
648 Windows CA Store (2019-05-27): OK - Certificate is trusted
649 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
650 Received Chain: *.azurewebsites.net --> Microsoft IT TLS CA 5
651 Verified Chain: *.azurewebsites.net --> Microsoft IT TLS CA 5 --> Baltimore CyberTrust Root
652 Received Chain Contains Anchor: OK - Anchor certificate not sent
653 Received Chain Order: OK - Order is valid
654 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
655
656 Extensions
657 OCSP Must-Staple: NOT SUPPORTED - Extension not found
658 Certificate Transparency: OK - 4 SCTs included
659
660 OCSP Stapling
661 OCSP Response Status: successful
662 Validation w/ Mozilla Store: OK - Response is trusted
663 Responder Id: 156FF22E61423B77D5E03FA8F9FD372129338AB2
664 Cert Status: good
665 Cert Serial Number: 2D000B84592470C8C655A0DD5D0000000B8459
666 This Update: Dec 19 19:19:03 2019 GMT
667 Next Update: Dec 23 19:19:03 2019 GMT
668
669 * Downgrade Attacks:
670 TLS_FALLBACK_SCSV: VULNERABLE - Signaling cipher suite not supported
671
672 * TLSV1_1 Cipher Suites:
673 Forward Secrecy OK - Supported
674 RC4 OK - Not Supported
675
676 Preferred:
677 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
678 Accepted:
679 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
680 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Site Not Found
681 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
682 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Site Not Found
683
684 * OpenSSL Heartbleed:
685 OK - Not vulnerable to Heartbleed
686
687 * TLSV1_2 Cipher Suites:
688 Forward Secrecy OK - Supported
689 RC4 OK - Not Supported
690
691 Preferred:
692 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Site Not Found
693 Accepted:
694 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Site Not Found
695 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Site Not Found
696 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
697 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Site Not Found
698 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Site Not Found
699 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Site Not Found
700 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Site Not Found
701 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 404 Site Not Found
702 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
703 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Site Not Found
704 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Site Not Found
705 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Site Not Found
706
707 * Deflate Compression:
708 OK - Compression disabled
709
710 * TLSV1 Cipher Suites:
711 Forward Secrecy OK - Supported
712 RC4 OK - Not Supported
713
714 Preferred:
715 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
716 Accepted:
717 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
718 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Site Not Found
719 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Site Not Found
720 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Site Not Found
721
722 * OpenSSL CCS Injection:
723 OK - Not vulnerable to OpenSSL CCS injection
724
725 * SSLV3 Cipher Suites:
726 Server rejected all cipher suites.
727
728 * SSLV2 Cipher Suites:
729 Server rejected all cipher suites.
730
731 * ROBOT Attack:
732 OK - Not vulnerable
733
734
735 SCAN COMPLETED IN 18.44 S
736 -------------------------
737#######################################################################################################################################
738Domains still to check: 1
739 Checking if the hostname tec.cl. given is in fact a domain...
740
741Analyzing domain: tec.cl.
742 Checking NameServers using system default resolver...
743 IP: 64.4.48.5 (United States)
744 HostName: ns2-05.azure-dns.net Type: NS
745 HostName: ns2-05.azure-dns.net Type: PTR
746 IP: 13.107.160.5 (United States)
747 HostName: ns4-05.azure-dns.info Type: NS
748 HostName: ns4-05.azure-dns.info Type: PTR
749 IP: 13.107.24.5 (United States)
750 HostName: ns3-05.azure-dns.org Type: NS
751 HostName: ns3-05.azure-dns.org Type: PTR
752 IP: 40.90.4.5 (United States)
753 HostName: ns1-05.azure-dns.com Type: NS
754 HostName: ns1-05.azure-dns.com Type: PTR
755
756 Checking MailServers using system default resolver...
757 IP: 104.47.55.110 (United States)
758 HostName: tec-cl.mail.protection.outlook.com Type: MX
759 IP: 104.47.70.110 (United States)
760 HostName: tec-cl.mail.protection.outlook.com Type: MX
761
762 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
763 No zone transfer found on nameserver 13.107.24.5
764 No zone transfer found on nameserver 64.4.48.5
765 No zone transfer found on nameserver 13.107.160.5
766 No zone transfer found on nameserver 40.90.4.5
767
768 Checking SPF record...
769
770 Checking SPF record...
771 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
772 New IP found: 40.92.0.0
773 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
774 New IP found: 40.107.0.0
775 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
776 New IP found: 52.100.0.0
777 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
778 New IP found: 104.47.0.0
779 There are no IPv4 addresses in the SPF. Maybe IPv6.
780 There are no IPv4 addresses in the SPF. Maybe IPv6.
781
782 Checking SPF record...
783 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 206.51.26.0/24, but only the network IP
784 New IP found: 206.51.26.0
785 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 193.109.81.0/24, but only the network IP
786 New IP found: 193.109.81.0
787 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 204.187.87.0/24, but only the network IP
788 New IP found: 204.187.87.0
789 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.9.240.0/20, but only the network IP
790 New IP found: 216.9.240.0
791 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 206.53.144.0/20, but only the network IP
792 New IP found: 206.53.144.0
793 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 67.223.64.0/19, but only the network IP
794 New IP found: 67.223.64.0
795 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 68.171.224.0/19, but only the network IP
796 New IP found: 68.171.224.0
797 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 74.82.64.0/19, but only the network IP
798 New IP found: 74.82.64.0
799 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 178.239.80.0/20, but only the network IP
800 New IP found: 178.239.80.0
801 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 131.117.171.0/28, but only the network IP
802 New IP found: 131.117.171.0
803 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 5.100.171.0/28, but only the network IP
804 New IP found: 5.100.171.0
805 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 180.168.204.0/22, but only the network IP
806 New IP found: 180.168.204.0
807
808 Checking SPF record...
809 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 206.51.26.0/24, but only the network IP
810 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 193.109.81.0/24, but only the network IP
811 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 204.187.87.0/24, but only the network IP
812 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.9.240.0/20, but only the network IP
813 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 206.53.144.0/20, but only the network IP
814 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 67.223.64.0/19, but only the network IP
815 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 68.171.224.0/19, but only the network IP
816 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 74.82.64.0/19, but only the network IP
817 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 178.239.80.0/20, but only the network IP
818 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 131.117.171.0/28, but only the network IP
819 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 5.100.171.0/28, but only the network IP
820 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 180.168.204.0/22, but only the network IP
821
822 Checking 192 most common hostnames using system default resolver...
823 IP: 104.43.254.102 (United States)
824 HostName: www.tec.cl. Type: A
825 IP: 40.97.120.168 (United States)
826 HostName: mail.tec.cl. Type: A
827 IP: 40.97.120.72 (United States)
828 HostName: mail.tec.cl. Type: A
829 IP: 40.97.121.40 (United States)
830 HostName: mail.tec.cl. Type: A
831 IP: 40.97.92.40 (United States)
832 HostName: mail.tec.cl. Type: A
833 IP: 40.97.121.8 (United States)
834 HostName: mail.tec.cl. Type: A
835 IP: 52.96.22.8 (United States)
836 HostName: mail.tec.cl. Type: A
837 IP: 52.96.10.248 (United States)
838 HostName: mail.tec.cl. Type: A
839 IP: 40.97.120.232 (United States)
840 HostName: mail.tec.cl. Type: A
841
842 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
843 Checking netblock 52.100.0.0
844 Checking netblock 178.239.80.0
845 Checking netblock 40.97.120.0
846 Checking netblock 216.9.240.0
847 Checking netblock 40.97.92.0
848 Checking netblock 74.82.64.0
849 Checking netblock 104.47.55.0
850 Checking netblock 40.97.121.0
851 Checking netblock 52.96.10.0
852 Checking netblock 13.107.24.0
853 Checking netblock 204.187.87.0
854 Checking netblock 193.109.81.0
855 Checking netblock 64.4.48.0
856 Checking netblock 131.117.171.0
857 Checking netblock 52.96.22.0
858 Checking netblock 68.171.224.0
859 Checking netblock 104.47.70.0
860 Checking netblock 206.53.144.0
861 Checking netblock 206.51.26.0
862 Checking netblock 67.223.64.0
863 Checking netblock 13.107.160.0
864 Checking netblock 5.100.171.0
865 Checking netblock 40.107.0.0
866 Checking netblock 40.90.4.0
867 Checking netblock 40.92.0.0
868 Checking netblock 104.43.254.0
869 Checking netblock 104.47.0.0
870 Checking netblock 180.168.204.0
871
872 Searching for tec.cl. emails in Google
873
874 Checking 31 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
875 Host 52.100.0.0 is up (reset ttl 64)
876 Host 178.239.80.0 is up (reset ttl 64)
877 Host 40.97.120.72 is up (reset ttl 64)
878 Host 216.9.240.0 is up (reset ttl 64)
879 Host 40.97.92.40 is up (reset ttl 64)
880 Host 74.82.64.0 is up (reset ttl 64)
881 Host 104.47.55.110 is up (reset ttl 64)
882 Host 40.97.121.40 is up (reset ttl 64)
883 Host 52.96.10.248 is up (reset ttl 64)
884 Host 13.107.24.5 is up (reset ttl 64)
885 Host 204.187.87.0 is up (reset ttl 64)
886 Host 193.109.81.0 is up (reset ttl 64)
887 Host 40.97.120.168 is up (reset ttl 64)
888 Host 64.4.48.5 is up (reset ttl 64)
889 Host 131.117.171.0 is up (reset ttl 64)
890 Host 52.96.22.8 is up (reset ttl 64)
891 Host 40.97.121.8 is up (reset ttl 64)
892 Host 68.171.224.0 is up (reset ttl 64)
893 Host 104.47.70.110 is up (reset ttl 64)
894 Host 206.53.144.0 is up (reset ttl 64)
895 Host 206.51.26.0 is up (reset ttl 64)
896 Host 67.223.64.0 is up (reset ttl 64)
897 Host 40.97.120.232 is up (reset ttl 64)
898 Host 13.107.160.5 is up (reset ttl 64)
899 Host 5.100.171.0 is up (reset ttl 64)
900 Host 40.107.0.0 is up (reset ttl 64)
901 Host 40.90.4.5 is up (reset ttl 64)
902 Host 40.92.0.0 is up (reset ttl 64)
903 Host 104.43.254.102 is up (reset ttl 64)
904 Host 104.47.0.0 is up (reset ttl 64)
905 Host 180.168.204.0 is up (reset ttl 64)
906
907 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
908 Scanning ip 52.100.0.0 ():
909 Scanning ip 178.239.80.0 ():
910 Scanning ip 40.97.120.72 (mail.tec.cl.):
911 80/tcp open http syn-ack ttl 238 Microsoft IIS httpd 10.0
912 | http-methods:
913 |_ Supported Methods: GET HEAD POST OPTIONS
914 |_http-server-header: Microsoft-IIS/10.0
915 |_http-title: Did not follow redirect to https://40.97.120.72/owa/
916 Device type: general purpose|load balancer
917 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
918 Scanning ip 216.9.240.0 ():
919 Scanning ip 40.97.92.40 (mail.tec.cl.):
920 80/tcp open http syn-ack ttl 238 Microsoft IIS httpd 10.0
921 | http-methods:
922 |_ Supported Methods: GET HEAD POST OPTIONS
923 |_http-server-header: Microsoft-IIS/10.0
924 |_http-title: Did not follow redirect to https://40.97.92.40/owa/
925 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
926 Scanning ip 74.82.64.0 ():
927 Scanning ip 104.47.55.110 (tec-cl.mail.protection.outlook.com):
928 Scanning ip 40.97.121.40 (mail.tec.cl.):
929 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
930 | http-methods:
931 |_ Supported Methods: GET HEAD POST OPTIONS
932 |_http-server-header: Microsoft-IIS/10.0
933 |_http-title: Did not follow redirect to https://40.97.121.40/owa/
934 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
935 Scanning ip 52.96.10.248 (mail.tec.cl.):
936 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
937 | http-methods:
938 |_ Supported Methods: GET HEAD POST OPTIONS
939 |_http-server-header: Microsoft-IIS/10.0
940 |_http-title: Did not follow redirect to https://52.96.10.248/owa/
941 Device type: general purpose|load balancer
942 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
943 Scanning ip 13.107.24.5 (ns3-05.azure-dns.org (PTR)):
944 53/tcp open domain? syn-ack ttl 117
945 | fingerprint-strings:
946 | DNSVersionBindReqTCP:
947 | version
948 |_ bind
949 Scanning ip 204.187.87.0 ():
950 Scanning ip 193.109.81.0 ():
951 Scanning ip 40.97.120.168 (mail.tec.cl.):
952 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
953 | http-methods:
954 |_ Supported Methods: GET HEAD POST OPTIONS
955 |_http-server-header: Microsoft-IIS/10.0
956 |_http-title: Did not follow redirect to https://40.97.120.168/owa/
957 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
958 Scanning ip 64.4.48.5 (ns2-05.azure-dns.net (PTR)):
959 53/tcp open domain? syn-ack ttl 117
960 | fingerprint-strings:
961 | DNSVersionBindReqTCP:
962 | version
963 |_ bind
964 Scanning ip 131.117.171.0 ():
965 Scanning ip 52.96.22.8 (mail.tec.cl.):
966 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
967 | http-methods:
968 |_ Supported Methods: GET HEAD POST OPTIONS
969 |_http-server-header: Microsoft-IIS/10.0
970 |_http-title: Did not follow redirect to https://52.96.22.8/owa/
971 Device type: general purpose|load balancer
972 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
973 Scanning ip 40.97.121.8 (mail.tec.cl.):
974 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
975 | http-methods:
976 |_ Supported Methods: GET HEAD POST OPTIONS
977 |_http-server-header: Microsoft-IIS/10.0
978 |_http-title: Did not follow redirect to https://40.97.121.8/owa/
979 Device type: general purpose|load balancer
980 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
981 Scanning ip 68.171.224.0 ():
982 Scanning ip 104.47.70.110 (tec-cl.mail.protection.outlook.com):
983 Scanning ip 206.53.144.0 ():
984 Scanning ip 206.51.26.0 ():
985 Scanning ip 67.223.64.0 ():
986 Scanning ip 40.97.120.232 (mail.tec.cl.):
987 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
988 | http-methods:
989 |_ Supported Methods: GET HEAD POST OPTIONS
990 |_http-server-header: Microsoft-IIS/10.0
991 |_http-title: Did not follow redirect to https://40.97.120.232/owa/
992 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
993 Scanning ip 13.107.160.5 (ns4-05.azure-dns.info (PTR)):
994 53/tcp open domain? syn-ack ttl 117
995 | fingerprint-strings:
996 | DNSVersionBindReqTCP:
997 | version
998 |_ bind
999 Scanning ip 5.100.171.0 ():
1000 Scanning ip 40.107.0.0 ():
1001 Scanning ip 40.90.4.5 (ns1-05.azure-dns.com (PTR)):
1002 53/tcp open domain? syn-ack ttl 117
1003 | fingerprint-strings:
1004 | DNSVersionBindReqTCP:
1005 | version
1006 |_ bind
1007 Scanning ip 40.92.0.0 ():
1008 Scanning ip 104.43.254.102 (www.tec.cl.):
1009 80/tcp open http syn-ack ttl 112 Microsoft IIS httpd 10.0
1010 |_http-server-header: Microsoft-IIS/10.0
1011 |_http-title: Microsoft Azure Web App - Error 404
1012 443/tcp open ssl/http syn-ack ttl 112 Microsoft IIS httpd 10.0
1013 |_http-server-header: Microsoft-IIS/10.0
1014 |_http-title: Microsoft Azure Web App - Error 404
1015 | ssl-cert: Subject: commonName=*.azurewebsites.net
1016 | Subject Alternative Name: DNS:*.azurewebsites.net, DNS:*.scm.azurewebsites.net, DNS:*.azure-mobile.net, DNS:*.scm.azure-mobile.net, DNS:*.sso.azurewebsites.net
1017 | Issuer: commonName=Microsoft IT TLS CA 5/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1018 | Public Key type: rsa
1019 | Public Key bits: 2048
1020 | Signature Algorithm: sha256WithRSAEncryption
1021 | Not valid before: 2019-09-24T02:18:56
1022 | Not valid after: 2021-09-24T02:18:56
1023 | MD5: 5455 ec91 49b2 a72f aa27 8e64 4b73 d5e3
1024 |_SHA-1: 398e 01a5 0c66 8a74 f010 4a83 6015 a26e 2155 4cce
1025 |_ssl-date: 2019-12-22T20:27:15+00:00; 0s from scanner time.
1026 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1027 Scanning ip 104.47.0.0 ():
1028 Scanning ip 180.168.204.0 ():
1029 WebCrawling domain's web servers... up to 50 max links.
1030
1031 + URL to crawl: http://mail.tec.cl.
1032 + Date: 2019-12-22
1033
1034 + Crawling URL: http://mail.tec.cl.:
1035 + Links:
1036 + Crawling http://mail.tec.cl. (400 Bad Request)
1037 + Searching for directories...
1038 + Searching open folders...
1039
1040
1041 + URL to crawl: http://mail.tec.cl.
1042 + Date: 2019-12-22
1043
1044 + Crawling URL: http://mail.tec.cl.:
1045 + Links:
1046 + Crawling http://mail.tec.cl. (400 Bad Request)
1047 + Searching for directories...
1048 + Searching open folders...
1049
1050
1051 + URL to crawl: http://mail.tec.cl.
1052 + Date: 2019-12-22
1053
1054 + Crawling URL: http://mail.tec.cl.:
1055 + Links:
1056 + Crawling http://mail.tec.cl. (400 Bad Request)
1057 + Searching for directories...
1058 + Searching open folders...
1059
1060
1061 + URL to crawl: http://mail.tec.cl.
1062 + Date: 2019-12-22
1063
1064 + Crawling URL: http://mail.tec.cl.:
1065 + Links:
1066 + Crawling http://mail.tec.cl. (400 Bad Request)
1067 + Searching for directories...
1068 + Searching open folders...
1069
1070
1071 + URL to crawl: http://mail.tec.cl.
1072 + Date: 2019-12-22
1073
1074 + Crawling URL: http://mail.tec.cl.:
1075 + Links:
1076 + Crawling http://mail.tec.cl. (400 Bad Request)
1077 + Searching for directories...
1078 + Searching open folders...
1079
1080
1081 + URL to crawl: http://mail.tec.cl.
1082 + Date: 2019-12-22
1083
1084 + Crawling URL: http://mail.tec.cl.:
1085 + Links:
1086 + Crawling http://mail.tec.cl. (400 Bad Request)
1087 + Searching for directories...
1088 + Searching open folders...
1089
1090
1091 + URL to crawl: http://mail.tec.cl.
1092 + Date: 2019-12-22
1093
1094 + Crawling URL: http://mail.tec.cl.:
1095 + Links:
1096 + Crawling http://mail.tec.cl. (400 Bad Request)
1097 + Searching for directories...
1098 + Searching open folders...
1099
1100
1101 + URL to crawl: http://mail.tec.cl.
1102 + Date: 2019-12-22
1103
1104 + Crawling URL: http://mail.tec.cl.:
1105 + Links:
1106 + Crawling http://mail.tec.cl. (400 Bad Request)
1107 + Searching for directories...
1108 + Searching open folders...
1109
1110
1111 + URL to crawl: http://www.tec.cl.
1112 + Date: 2019-12-22
1113
1114 + Crawling URL: http://www.tec.cl.:
1115 + Links:
1116 + Crawling http://www.tec.cl. (400 Bad Request)
1117 + Searching for directories...
1118 + Searching open folders...
1119
1120
1121 + URL to crawl: https://www.tec.cl.
1122 + Date: 2019-12-22
1123
1124 + Crawling URL: https://www.tec.cl.:
1125 + Links:
1126 + Crawling https://www.tec.cl. ([Errno 104] Connection reset by peer)
1127 + Searching for directories...
1128 + Searching open folders...
1129
1130--Finished--
1131Summary information for domain tec.cl.
1132-----------------------------------------
1133
1134 Domain Ips Information:
1135 IP: 52.100.0.0
1136 Type: SPF
1137 Is Active: True (reset ttl 64)
1138 IP: 178.239.80.0
1139 Type: SPF
1140 Type: SPF
1141 Is Active: True (reset ttl 64)
1142 IP: 40.97.120.72
1143 HostName: mail.tec.cl. Type: A
1144 Country: United States
1145 Is Active: True (reset ttl 64)
1146 Port: 80/tcp open http syn-ack ttl 238 Microsoft IIS httpd 10.0
1147 Script Info: | http-methods:
1148 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1149 Script Info: |_http-server-header: Microsoft-IIS/10.0
1150 Script Info: |_http-title: Did not follow redirect to https://40.97.120.72/owa/
1151 Script Info: Device type: general purpose|load balancer
1152 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1153 IP: 216.9.240.0
1154 Type: SPF
1155 Type: SPF
1156 Is Active: True (reset ttl 64)
1157 IP: 40.97.92.40
1158 HostName: mail.tec.cl. Type: A
1159 Country: United States
1160 Is Active: True (reset ttl 64)
1161 Port: 80/tcp open http syn-ack ttl 238 Microsoft IIS httpd 10.0
1162 Script Info: | http-methods:
1163 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1164 Script Info: |_http-server-header: Microsoft-IIS/10.0
1165 Script Info: |_http-title: Did not follow redirect to https://40.97.92.40/owa/
1166 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1167 IP: 74.82.64.0
1168 Type: SPF
1169 Type: SPF
1170 Is Active: True (reset ttl 64)
1171 IP: 104.47.55.110
1172 HostName: tec-cl.mail.protection.outlook.com Type: MX
1173 Country: United States
1174 Is Active: True (reset ttl 64)
1175 IP: 40.97.121.40
1176 HostName: mail.tec.cl. Type: A
1177 Country: United States
1178 Is Active: True (reset ttl 64)
1179 Port: 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
1180 Script Info: | http-methods:
1181 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1182 Script Info: |_http-server-header: Microsoft-IIS/10.0
1183 Script Info: |_http-title: Did not follow redirect to https://40.97.121.40/owa/
1184 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1185 IP: 52.96.10.248
1186 HostName: mail.tec.cl. Type: A
1187 Country: United States
1188 Is Active: True (reset ttl 64)
1189 Port: 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
1190 Script Info: | http-methods:
1191 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1192 Script Info: |_http-server-header: Microsoft-IIS/10.0
1193 Script Info: |_http-title: Did not follow redirect to https://52.96.10.248/owa/
1194 Script Info: Device type: general purpose|load balancer
1195 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1196 IP: 13.107.24.5
1197 HostName: ns3-05.azure-dns.org Type: NS
1198 HostName: ns3-05.azure-dns.org Type: PTR
1199 Country: United States
1200 Is Active: True (reset ttl 64)
1201 Port: 53/tcp open domain? syn-ack ttl 117
1202 Script Info: | fingerprint-strings:
1203 Script Info: | DNSVersionBindReqTCP:
1204 Script Info: | version
1205 Script Info: |_ bind
1206 IP: 204.187.87.0
1207 Type: SPF
1208 Type: SPF
1209 Is Active: True (reset ttl 64)
1210 IP: 193.109.81.0
1211 Type: SPF
1212 Type: SPF
1213 Is Active: True (reset ttl 64)
1214 IP: 40.97.120.168
1215 HostName: mail.tec.cl. Type: A
1216 Country: United States
1217 Is Active: True (reset ttl 64)
1218 Port: 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
1219 Script Info: | http-methods:
1220 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1221 Script Info: |_http-server-header: Microsoft-IIS/10.0
1222 Script Info: |_http-title: Did not follow redirect to https://40.97.120.168/owa/
1223 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1224 IP: 64.4.48.5
1225 HostName: ns2-05.azure-dns.net Type: NS
1226 HostName: ns2-05.azure-dns.net Type: PTR
1227 Country: United States
1228 Is Active: True (reset ttl 64)
1229 Port: 53/tcp open domain? syn-ack ttl 117
1230 Script Info: | fingerprint-strings:
1231 Script Info: | DNSVersionBindReqTCP:
1232 Script Info: | version
1233 Script Info: |_ bind
1234 IP: 131.117.171.0
1235 Type: SPF
1236 Type: SPF
1237 Is Active: True (reset ttl 64)
1238 IP: 52.96.22.8
1239 HostName: mail.tec.cl. Type: A
1240 Country: United States
1241 Is Active: True (reset ttl 64)
1242 Port: 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
1243 Script Info: | http-methods:
1244 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1245 Script Info: |_http-server-header: Microsoft-IIS/10.0
1246 Script Info: |_http-title: Did not follow redirect to https://52.96.22.8/owa/
1247 Script Info: Device type: general purpose|load balancer
1248 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1249 IP: 40.97.121.8
1250 HostName: mail.tec.cl. Type: A
1251 Country: United States
1252 Is Active: True (reset ttl 64)
1253 Port: 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
1254 Script Info: | http-methods:
1255 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1256 Script Info: |_http-server-header: Microsoft-IIS/10.0
1257 Script Info: |_http-title: Did not follow redirect to https://40.97.121.8/owa/
1258 Script Info: Device type: general purpose|load balancer
1259 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1260 IP: 68.171.224.0
1261 Type: SPF
1262 Type: SPF
1263 Is Active: True (reset ttl 64)
1264 IP: 104.47.70.110
1265 HostName: tec-cl.mail.protection.outlook.com Type: MX
1266 Country: United States
1267 Is Active: True (reset ttl 64)
1268 IP: 206.53.144.0
1269 Type: SPF
1270 Type: SPF
1271 Is Active: True (reset ttl 64)
1272 IP: 206.51.26.0
1273 Type: SPF
1274 Type: SPF
1275 Is Active: True (reset ttl 64)
1276 IP: 67.223.64.0
1277 Type: SPF
1278 Type: SPF
1279 Is Active: True (reset ttl 64)
1280 IP: 40.97.120.232
1281 HostName: mail.tec.cl. Type: A
1282 Country: United States
1283 Is Active: True (reset ttl 64)
1284 Port: 80/tcp open http syn-ack ttl 237 Microsoft IIS httpd 10.0
1285 Script Info: | http-methods:
1286 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1287 Script Info: |_http-server-header: Microsoft-IIS/10.0
1288 Script Info: |_http-title: Did not follow redirect to https://40.97.120.232/owa/
1289 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1290 IP: 13.107.160.5
1291 HostName: ns4-05.azure-dns.info Type: NS
1292 HostName: ns4-05.azure-dns.info Type: PTR
1293 Country: United States
1294 Is Active: True (reset ttl 64)
1295 Port: 53/tcp open domain? syn-ack ttl 117
1296 Script Info: | fingerprint-strings:
1297 Script Info: | DNSVersionBindReqTCP:
1298 Script Info: | version
1299 Script Info: |_ bind
1300 IP: 5.100.171.0
1301 Type: SPF
1302 Type: SPF
1303 Is Active: True (reset ttl 64)
1304 IP: 40.107.0.0
1305 Type: SPF
1306 Is Active: True (reset ttl 64)
1307 IP: 40.90.4.5
1308 HostName: ns1-05.azure-dns.com Type: NS
1309 HostName: ns1-05.azure-dns.com Type: PTR
1310 Country: United States
1311 Is Active: True (reset ttl 64)
1312 Port: 53/tcp open domain? syn-ack ttl 117
1313 Script Info: | fingerprint-strings:
1314 Script Info: | DNSVersionBindReqTCP:
1315 Script Info: | version
1316 Script Info: |_ bind
1317 IP: 40.92.0.0
1318 Type: SPF
1319 Is Active: True (reset ttl 64)
1320 IP: 104.43.254.102
1321 HostName: www.tec.cl. Type: A
1322 Country: United States
1323 Is Active: True (reset ttl 64)
1324 Port: 80/tcp open http syn-ack ttl 112 Microsoft IIS httpd 10.0
1325 Script Info: |_http-server-header: Microsoft-IIS/10.0
1326 Script Info: |_http-title: Microsoft Azure Web App - Error 404
1327 Port: 443/tcp open ssl/http syn-ack ttl 112 Microsoft IIS httpd 10.0
1328 Script Info: |_http-server-header: Microsoft-IIS/10.0
1329 Script Info: |_http-title: Microsoft Azure Web App - Error 404
1330 Script Info: | ssl-cert: Subject: commonName=*.azurewebsites.net
1331 Script Info: | Subject Alternative Name: DNS:*.azurewebsites.net, DNS:*.scm.azurewebsites.net, DNS:*.azure-mobile.net, DNS:*.scm.azure-mobile.net, DNS:*.sso.azurewebsites.net
1332 Script Info: | Issuer: commonName=Microsoft IT TLS CA 5/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1333 Script Info: | Public Key type: rsa
1334 Script Info: | Public Key bits: 2048
1335 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1336 Script Info: | Not valid before: 2019-09-24T02:18:56
1337 Script Info: | Not valid after: 2021-09-24T02:18:56
1338 Script Info: | MD5: 5455 ec91 49b2 a72f aa27 8e64 4b73 d5e3
1339 Script Info: |_SHA-1: 398e 01a5 0c66 8a74 f010 4a83 6015 a26e 2155 4cce
1340 Script Info: |_ssl-date: 2019-12-22T20:27:15+00:00; 0s from scanner time.
1341 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1342 IP: 104.47.0.0
1343 Type: SPF
1344 Is Active: True (reset ttl 64)
1345 IP: 180.168.204.0
1346 Type: SPF
1347 Type: SPF
1348 Is Active: True (reset ttl 64)
1349
1350--------------End Summary --------------
1351-----------------------------------------
1352#######################################################################################################################################
1353traceroute to tec.cl (104.43.254.102), 30 hops max, 60 byte packets
1354 1 10.252.204.1 (10.252.204.1) 35.322 ms 35.350 ms 35.340 ms
1355 2 104.245.145.177 (104.245.145.177) 35.329 ms 35.316 ms 35.299 ms
1356 3 te0-0-1-17.220.ccr32.yyz02.atlas.cogentco.com (38.122.68.225) 35.286 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9) 35.313 ms te0-0-1-17.220.ccr32.yyz02.atlas.cogentco.com (38.122.68.225) 35.242 ms
1357 4 38.32.56.202 (38.32.56.202) 59.570 ms 59.546 ms 35.166 ms
1358 5 ae20-0.icr02.yto20.ntwk.msn.net (104.44.237.159) 59.460 ms 35.144 ms 35.134 ms
1359 6 be-122-0.ibr02.yto20.ntwk.msn.net (104.44.20.167) 88.965 ms 75.828 ms 38.32.56.202 (38.32.56.202) 37.867 ms
1360 7 be-5-0.ibr02.ch2.ntwk.msn.net (104.44.17.147) 75.635 ms ae22-0.icr01.yto20.ntwk.msn.net (104.44.237.151) 75.536 ms be-5-0.ibr02.ch2.ntwk.msn.net (104.44.17.147) 75.553 ms
1361 8 be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253) 85.442 ms 85.341 ms 85.341 ms
1362 9 ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186) 54.566 ms be-5-0.ibr02.ch2.ntwk.msn.net (104.44.17.147) 85.145 ms ae161-0.icr03.dsm05.ntwk.msn.net (104.44.22.190) 85.267 ms
1363#######################################################################################################################################
1364----- tec.cl -----
1365
1366
1367Host's addresses:
1368__________________
1369
1370tec.cl. 2520 IN A 104.43.254.102
1371
1372
1373Name Servers:
1374______________
1375
1376ns1-05.azure-dns.com. 84804 IN A 40.90.4.5
1377ns2-05.azure-dns.net. 80898 IN A 64.4.48.5
1378ns3-05.azure-dns.org. 82983 IN A 13.107.24.5
1379ns4-05.azure-dns.info. 25972 IN A 13.107.160.5
1380
1381
1382Mail (MX) Servers:
1383___________________
1384
1385tec-cl.mail.protection.outlook.com. 10 IN A 104.47.58.110
1386tec-cl.mail.protection.outlook.com. 10 IN A 104.47.70.110
1387
1388
1389Brute forcing with /usr/share/dnsenum/dns.txt:
1390_______________________________________________
1391
1392admin.tec.cl. 2912 IN CNAME tecadmin.azurewebsites.net.
1393tecadmin.azurewebsites.net. 1113 IN CNAME (
1394waws-prod-dm1-103.sip.azurewebsites.windows.net. 551 IN CNAME (
1395waws-prod-dm1-103.cloudapp.net. 10 IN A 104.43.254.102
1396mail.tec.cl. 2892 IN CNAME autodiscover.outlook.com.
1397autodiscover.outlook.com. 83 IN CNAME autod.ha-autod.office.com.
1398autod.ha-autod.office.com. 60 IN A 40.97.120.40
1399autod.ha-autod.office.com. 60 IN A 40.97.121.8
1400autod.ha-autod.office.com. 60 IN A 40.97.120.184
1401autod.ha-autod.office.com. 60 IN A 40.97.121.40
1402autod.ha-autod.office.com. 60 IN A 40.97.121.24
1403autod.ha-autod.office.com. 60 IN A 52.96.22.184
1404autod.ha-autod.office.com. 60 IN A 40.97.120.168
1405autod.ha-autod.office.com. 60 IN A 52.96.16.168
1406www.tec.cl. 2465 IN CNAME tecadmin.azurewebsites.net.
1407tecadmin.azurewebsites.net. 665 IN CNAME (
1408waws-prod-dm1-103.sip.azurewebsites.windows.net. 665 IN CNAME (
1409waws-prod-dm1-103.cloudapp.net. 10 IN A 104.43.254.102
1410
1411
1412Launching Whois Queries:
1413_________________________
1414
1415 whois ip result: 104.43.254.0 -> 104.40.0.0/13
1416
1417
1418tec.cl______
1419
1420 104.40.0.0/13
1421#######################################################################################################################################
1422WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1423Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-22 15:04 EST
1424Nmap scan report for 104.43.254.102
1425Host is up (0.053s latency).
1426Not shown: 491 filtered ports, 3 closed ports
1427Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1428PORT STATE SERVICE
142980/tcp open http
1430443/tcp open https
1431
1432Nmap done: 1 IP address (1 host up) scanned in 4.54 seconds
1433######################################################################################################################################
1434Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-22 15:04 EST
1435Nmap scan report for 104.43.254.102
1436Host is up (0.054s latency).
1437Not shown: 2 filtered ports
1438PORT STATE SERVICE
143953/udp open|filtered domain
144067/udp open|filtered dhcps
144168/udp open|filtered dhcpc
144269/udp open|filtered tftp
144388/udp open|filtered kerberos-sec
1444123/udp open|filtered ntp
1445139/udp open|filtered netbios-ssn
1446161/udp open|filtered snmp
1447162/udp open|filtered snmptrap
1448389/udp open|filtered ldap
1449500/udp open|filtered isakmp
1450520/udp open|filtered route
14512049/udp open|filtered nfs
1452
1453Nmap done: 1 IP address (1 host up) scanned in 2.16 seconds
1454#######################################################################################################################################
1455HTTP/1.1 404 Site Not Found
1456Content-Length: 2778
1457Content-Type: text/html
1458Server: Microsoft-IIS/10.0
1459Date: Sun, 22 Dec 2019 20:04:30 GMT
1460Connection: close
1461#######################################################################################################################################
1462https://blogs.msdn.microsoft.com/appserviceteam/2017/08/08/faq-app-service-domain-preview-and-custom-domains/
1463https://docs.microsoft.com/en-us/azure/app-service-web/app-service-web-tutorial-custom-domain
1464text/css
1465text/javascript
1466#######################################################################################################################################
1467Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-22 15:04 EST
1468NSE: Loaded 163 scripts for scanning.
1469NSE: Script Pre-scanning.
1470Initiating NSE at 15:04
1471Completed NSE at 15:04, 0.00s elapsed
1472Initiating NSE at 15:04
1473Completed NSE at 15:04, 0.00s elapsed
1474Initiating Parallel DNS resolution of 1 host. at 15:04
1475Completed Parallel DNS resolution of 1 host. at 15:04, 0.02s elapsed
1476Initiating SYN Stealth Scan at 15:04
1477Scanning 104.43.254.102 [1 port]
1478Discovered open port 80/tcp on 104.43.254.102
1479Completed SYN Stealth Scan at 15:04, 0.09s elapsed (1 total ports)
1480Initiating Service scan at 15:04
1481Scanning 1 service on 104.43.254.102
1482Completed Service scan at 15:05, 6.14s elapsed (1 service on 1 host)
1483Initiating OS detection (try #1) against 104.43.254.102
1484Retrying OS detection (try #2) against 104.43.254.102
1485Initiating Traceroute at 15:05
1486Completed Traceroute at 15:05, 6.02s elapsed
1487Initiating Parallel DNS resolution of 10 hosts. at 15:05
1488Completed Parallel DNS resolution of 10 hosts. at 15:05, 0.31s elapsed
1489NSE: Script scanning 104.43.254.102.
1490Initiating NSE at 15:05
1491Completed NSE at 15:06, 62.28s elapsed
1492Initiating NSE at 15:06
1493Completed NSE at 15:06, 0.35s elapsed
1494Nmap scan report for 104.43.254.102
1495Host is up (0.13s latency).
1496
1497PORT STATE SERVICE VERSION
149880/tcp open http Microsoft IIS httpd 10.0
1499| http-brute:
1500|_ Path "/" does not require authentication
1501|_http-chrono: Request times for /; avg: 238.83ms; min: 222.42ms; max: 275.94ms
1502|_http-csrf: Couldn't find any CSRF vulnerabilities.
1503|_http-date: Sun, 22 Dec 2019 20:05:22 GMT; 0s from local time.
1504|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1505|_http-dombased-xss: Couldn't find any DOM based XSS.
1506|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1507| http-errors:
1508| Spidering limited to: maxpagecount=40; withinhost=104.43.254.102
1509| Found the following error pages:
1510|
1511| Error Code: 404
1512|_ http://104.43.254.102:80/
1513|_http-feed: Couldn't find any feeds.
1514|_http-fetch: Please enter the complete path of the directory to save data in.
1515| http-headers:
1516| Content-Type: text/html
1517| Server: Microsoft-IIS/10.0
1518| Date: Sun, 22 Dec 2019 20:05:26 GMT
1519| Connection: close
1520| Content-Length: 2778
1521|
1522|_ (Request type: GET)
1523|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1524|_http-mobileversion-checker: No mobile version detected.
1525|_http-security-headers:
1526|_http-server-header: Microsoft-IIS/10.0
1527| http-sitemap-generator:
1528| Directory structure:
1529| Longest directory structure:
1530| Depth: 0
1531| Dir: /
1532| Total files found (by extension):
1533|_
1534|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1535|_http-title: Microsoft Azure Web App - Error 404
1536| http-vhosts:
1537|_127 names had status 404
1538|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1539|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1540|_http-xssed: No previously reported XSS vuln.
1541| vulscan: VulDB - https://vuldb.com:
1542| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
1543| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
1544| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
1545| [139953] Microsoft Internet Explorer 10/11 memory corruption
1546| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
1547| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
1548| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
1549| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
1550| [136279] Microsoft Internet Explorer 10/11 memory corruption
1551| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
1552| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1553| [134682] Microsoft Internet Explorer 10/11 memory corruption
1554| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1555| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1556| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
1557| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1558| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1559| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1560| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1561| [131678] Microsoft Internet Explorer 10/11 memory corruption
1562| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
1563| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
1564| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
1565| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1566| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1567| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1568| [131618] Microsoft Internet Explorer 10/11 memory corruption
1569| [130827] Microsoft Internet Explorer 10/11 information disclosure
1570| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
1571| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
1572| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
1573| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
1574| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
1575| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
1576| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
1577| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1578| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1579| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1580| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1581| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
1582| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
1583| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
1584| [122846] Microsoft Internet Explorer 10/11 memory corruption
1585| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
1586| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1587| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
1588| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
1589| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
1590| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
1591| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
1592| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
1593| [115997] Microsoft Internet Explorer 10/11 memory corruption
1594| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
1595| [114567] Microsoft Internet Explorer 10/11 information disclosure
1596| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
1597| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
1598| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
1599| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
1600| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
1601| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
1602| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
1603| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
1604| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
1605| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1606| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
1607| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1608| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
1609| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
1610| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
1611| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1612| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1613| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
1614| [109365] Microsoft Internet Explorer 10/11 memory corruption
1615| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
1616| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
1617| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
1618| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
1619| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
1620| [102461] Microsoft Internet Explorer 10/11 memory corruption
1621| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
1622| [101007] Microsoft Internet Explorer 10/11 memory corruption
1623| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
1624| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
1625| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
1626| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
1627| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1628| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
1629| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1630| [97967] Microsoft Internet Explorer 10/11 memory corruption
1631| [97965] Microsoft Internet Explorer 10/11 memory corruption
1632| [94436] Microsoft Windows 10 Graphics memory corruption
1633| [94421] Microsoft Internet Explorer 10/11 information disclosure
1634| [94418] Microsoft Internet Explorer 10/11 privilege escalation
1635| [93427] Microsoft Internet Explorer 10/11 memory corruption
1636| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
1637| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
1638| [92561] Microsoft Internet Explorer 10/11 privilege escalation
1639| [92560] Microsoft Internet Explorer 10/11 privilege escalation
1640| [92557] Microsoft Internet Explorer 10/11 memory corruption
1641| [91560] Microsoft Windows 10 Object denial of service
1642| [91517] Microsoft Internet Explorer 10/11 memory corruption
1643| [91516] Microsoft Internet Explorer 10/11 privilege escalation
1644| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
1645| [90683] Microsoft Internet Explorer 10/11 information disclosure
1646| [89020] Microsoft Internet Explorer 10/11 information disclosure
1647| [89010] Microsoft Internet Explorer 10/11 memory corruption
1648| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1649| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
1650| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
1651| [87139] Microsoft Internet Explorer 10/11 information disclosure
1652| [82246] Microsoft Internet Explorer 10/11 memory corruption
1653| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
1654| [81271] Microsoft Windows 10 PDF Library memory corruption
1655| [81249] Microsoft Internet Explorer 10/11 memory corruption
1656| [81243] Microsoft Internet Explorer 10 memory corruption
1657| [80845] Microsoft Internet Explorer 10 memory corruption
1658| [80843] Microsoft Internet Explorer 10 memory corruption
1659| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
1660| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
1661| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
1662| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
1663| [79515] Microsoft Windows 10 Kernel memory corruption
1664| [79473] Microsoft Internet Explorer 10 memory corruption
1665| [79466] Microsoft Internet Explorer 10/11 memory corruption
1666| [79463] Microsoft Internet Explorer 10 memory corruption
1667| [79158] Microsoft Internet Explorer 10/11 memory corruption
1668| [79157] Microsoft Internet Explorer 10/11 memory corruption
1669| [79139] Microsoft Internet Explorer 10/11 memory corruption
1670| [78383] Microsoft Internet Explorer 10/11 privilege escalation
1671| [78382] Microsoft Internet Explorer 10 memory corruption
1672| [77643] Microsoft Internet Explorer 10/11 memory corruption
1673| [77597] Microsoft Internet Explorer 10/11 File denial of service
1674| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
1675| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
1676| [77005] Microsoft Internet Explorer 10/11 memory corruption
1677| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
1678| [76488] Microsoft Internet Explorer 10/11 File information disclosure
1679| [76487] Microsoft Internet Explorer 10/11 memory corruption
1680| [76475] Microsoft Internet Explorer 10/11 memory corruption
1681| [76436] Microsoft Internet Explorer 10/11 memory corruption
1682| [75781] Microsoft Internet Explorer 10/11 memory corruption
1683| [75777] Microsoft Internet Explorer 10 memory corruption
1684| [75767] Microsoft Internet Explorer 10/11 privilege escalation
1685| [75766] Microsoft Internet Explorer 10/11 memory corruption
1686| [75765] Microsoft Internet Explorer 10/11 memory corruption
1687| [75762] Microsoft Internet Explorer 10/11 memory corruption
1688| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
1689| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
1690| [75324] Microsoft Internet Explorer 10/11 memory corruption
1691| [74857] Microsoft Internet Explorer 10/11 memory corruption
1692| [73944] Microsoft Internet Explorer 10/11 memory corruption
1693| [73942] Microsoft Internet Explorer 10 memory corruption
1694| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
1695| [69144] Microsoft Internet Explorer 10/11 memory corruption
1696| [69141] Microsoft Internet Explorer 10/11 privilege escalation
1697| [69138] Microsoft Internet Explorer 10/11 memory corruption
1698| [69126] Microsoft Internet Explorer 10/11 memory corruption
1699| [69122] Microsoft Internet Explorer 10/11 memory corruption
1700| [69117] Microsoft Internet Explorer 10/11 memory corruption
1701| [69115] Microsoft Internet Explorer 10 memory corruption
1702| [69114] Microsoft Internet Explorer 10 memory corruption
1703| [68398] Microsoft Internet Explorer 10 memory corruption
1704| [68180] Microsoft Internet Explorer 10/11 privilege escalation
1705| [68179] Microsoft Internet Explorer 10/11 privilege escalation
1706| [68168] Microsoft Internet Explorer 10/11 memory corruption
1707| [67810] Microsoft Internet Explorer 10/11 memory corruption
1708| [67504] Microsoft Internet Explorer 10/11 memory corruption
1709| [67495] Microsoft Internet Explorer 10 memory corruption
1710| [67493] Microsoft Internet Explorer 10/11 memory corruption
1711| [67491] Microsoft Internet Explorer 10/11 memory corruption
1712| [67486] Microsoft Internet Explorer 10 memory corruption
1713| [67482] Microsoft Internet Explorer 10/11 memory corruption
1714| [67352] Microsoft Internet Explorer 10/11 memory corruption
1715| [67347] Microsoft Internet Explorer 10/11 memory corruption
1716| [67344] Microsoft Internet Explorer 10/11 memory corruption
1717| [67341] Microsoft Internet Explorer 10/11 memory corruption
1718| [67334] Microsoft Internet Explorer 10 memory corruption
1719| [67330] Microsoft Internet Explorer 10/11 memory corruption
1720| [67329] Microsoft Internet Explorer 10/11 memory corruption
1721| [67004] Microsoft Internet Explorer 10/11 memory corruption
1722| [13537] Microsoft Internet Explorer 10/11 memory corruption
1723| [13535] Microsoft Internet Explorer 10/11 memory corruption
1724| [13530] Microsoft Internet Explorer 10/11 memory corruption
1725| [13529] Microsoft Internet Explorer 10/11 memory corruption
1726| [13523] Microsoft Internet Explorer 10/11 memory corruption
1727| [13516] Microsoft Internet Explorer 10/11 memory corruption
1728| [13513] Microsoft Internet Explorer 10/11 memory corruption
1729| [13510] Microsoft Internet Explorer 10/11 memory corruption
1730| [13507] Microsoft Internet Explorer 10 memory corruption
1731| [13506] Microsoft Internet Explorer 10 memory corruption
1732| [13498] Microsoft Internet Explorer 10/11 memory corruption
1733| [13495] Microsoft Internet Explorer 10/11 information disclosure
1734| [13491] Microsoft Internet Explorer 10/11 memory corruption
1735| [12546] Microsoft Internet Explorer 10/11 memory corruption
1736| [12544] Microsoft Internet Explorer 10/11 memory corruption
1737| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
1738| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
1739| [11433] Microsoft Internet Explorer 10 memory corruption
1740| [10625] Microsoft Internet Explorer 10 memory corruption
1741| [10624] Microsoft Internet Explorer 10 memory corruption
1742| [10621] Microsoft Internet Explorer 10 memory corruption
1743| [10620] Microsoft Internet Explorer 10 memory corruption
1744| [10219] Microsoft Internet Explorer 10 memory corruption
1745| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
1746| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
1747| [9411] Microsoft Internet Explorer 10 memory corruption
1748| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
1749| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
1750| [9090] Microsoft Internet Explorer 10 memory corruption
1751| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
1752| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
1753| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
1754| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
1755| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
1756| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
1757| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
1758|
1759| MITRE CVE - https://cve.mitre.org:
1760| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
1761| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
1762| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1763| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1764| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
1765| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
1766| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1767| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1768| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1769| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1770| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1771| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1772| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
1773| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
1774| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
1775| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
1776| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
1777| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
1778| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
1779| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
1780| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
1781| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
1782| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
1783| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
1784| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
1785| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
1786| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
1787| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
1788| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
1789| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
1790| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
1791| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
1792| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
1793| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
1794| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
1795| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
1796| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
1797| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
1798| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
1799| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
1800| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
1801| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
1802| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
1803| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
1804| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
1805| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
1806| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
1807| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
1808| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
1809| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
1810| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
1811| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
1812| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
1813| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
1814| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
1815| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
1816| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
1817| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
1818| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
1819| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
1820| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
1821| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
1822| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
1823| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
1824| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
1825| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
1826| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
1827| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
1828| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
1829| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
1830| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
1831| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
1832| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
1833| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
1834| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
1835| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
1836| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
1837| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
1838| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
1839| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
1840| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
1841| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
1842| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
1843| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
1844| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
1845| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
1846| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
1847| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
1848| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
1849| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
1850| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
1851| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
1852| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
1853| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
1854| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
1855| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
1856| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
1857| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
1858| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
1859| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
1860| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
1861| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
1862| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
1863| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
1864|
1865| SecurityFocus - https://www.securityfocus.com/bid/:
1866| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
1867|
1868| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1869| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
1870| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
1871|
1872| Exploit-DB - https://www.exploit-db.com:
1873| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
1874| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
1875|
1876| OpenVAS (Nessus) - http://www.openvas.org:
1877| [855384] Solaris Update for snmp/mibiisa 108870-36
1878| [855273] Solaris Update for snmp/mibiisa 108869-36
1879| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
1880|
1881| SecurityTracker - https://www.securitytracker.com:
1882| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
1883|
1884| OSVDB - http://www.osvdb.org:
1885| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
1886| [87262] Microsoft IIS FTP Command Injection Information Disclosure
1887| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
1888| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
1889| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
1890| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
1891| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
1892| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
1893| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
1894| [71856] Microsoft IIS Status Header Handling Remote Overflow
1895| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
1896| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
1897| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
1898| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
1899| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
1900| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
1901| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
1902| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
1903| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
1904| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
1905| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
1906| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
1907| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
1908| [59892] Microsoft IIS Malformed Host Header Remote DoS
1909| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
1910| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
1911| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
1912| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
1913| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
1914| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
1915| [55269] Microsoft IIS Traversal GET Request Remote DoS
1916| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
1917| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
1918| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
1919| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
1920| [52238] Microsoft IIS IDC Extension XSS
1921| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
1922| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
1923| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
1924| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
1925| [43451] Microsoft IIS HTTP Request Smuggling
1926| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
1927| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
1928| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
1929| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
1930| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
1931| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
1932| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
1933| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
1934| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
1935| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
1936| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
1937| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
1938| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
1939| [27152] Microsoft Windows IIS ASP Page Processing Overflow
1940| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
1941| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
1942| [21805] Microsoft IIS Crafted URL Remote DoS
1943| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
1944| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
1945| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
1946| [17124] Microsoft IIS Malformed WebDAV Request DoS
1947| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
1948| [17122] Microsoft IIS Permission Weakness .COM File Upload
1949| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
1950| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
1951| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
1952| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
1953| [13760] Microsoft IIS Malformed URL Request DoS
1954| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
1955| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
1956| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
1957| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
1958| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
1959| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
1960| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
1961| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
1962| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
1963| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
1964| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
1965| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
1966| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
1967| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
1968| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
1969| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
1970| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
1971| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
1972| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
1973| [11257] Microsoft IIS Malformed GET Request DoS
1974| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
1975| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
1976| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
1977| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
1978| [9200] Microsoft IIS Unspecified XSS Variant
1979| [9199] Microsoft IIS shtml.dll XSS
1980| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
1981| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
1982| [7737] Microsoft IIS ASP Redirection Function XSS
1983| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
1984| [5851] Microsoft IIS Single Dot Source Code Disclosure
1985| [5736] Microsoft IIS Relative Path System Privilege Escalation
1986| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
1987| [5633] Microsoft IIS Invalid WebDAV Request DoS
1988| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
1989| [5584] Microsoft IIS URL Redirection Malformed Length DoS
1990| [5566] Microsoft IIS Form_VBScript.asp XSS
1991| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
1992| [4864] Microsoft IIS TRACK Logging Failure
1993| [4863] Microsoft IIS Active Server Page Header DoS
1994| [4791] Microsoft IIS Response Object DoS
1995| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
1996| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
1997| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
1998| [3500] Microsoft IIS fpcount.exe Remote Overflow
1999| [3341] Microsoft IIS Redirect Response XSS
2000| [3339] Microsoft IIS HTTP Error Page XSS
2001| [3338] Microsoft IIS Help File XSS
2002| [3328] Microsoft IIS FTP Status Request DoS
2003| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
2004| [3325] Microsoft IIS HTR ISAPI Overflow
2005| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
2006| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
2007| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
2008| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
2009| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
2010| [3231] Microsoft IIS Log Bypass
2011| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
2012| [1931] Microsoft IIS MIME Content-Type Header DoS
2013| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
2014| [1826] Microsoft IIS Domain Guest Account Disclosure
2015| [1824] Microsoft IIS FTP DoS
2016| [1804] Microsoft IIS Long Request Parsing Remote DoS
2017| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
2018| [1750] Microsoft IIS File Fragment Disclosure
2019| [1543] Microsoft NT/IIS Invalid URL Request DoS
2020| [1504] Microsoft IIS File Permission Canonicalization Bypass
2021| [1465] Microsoft IIS .htr Missing Variable DoS
2022| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
2023| [1322] Microsoft IIS Malformed .htr Request DoS
2024| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
2025| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
2026| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
2027| [1170] Microsoft IIS Escape Character URL Access Bypass
2028| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
2029| [1082] Microsoft IIS Domain Resolution Access Bypass
2030| [1041] Microsoft IIS Malformed HTTP Request Header DoS
2031| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
2032| [930] Microsoft IIS Shared ASP Cache Information Disclosure
2033| [929] Microsoft IIS FTP Server NLST Command Overflow
2034| [928] Microsoft IIS Long Request Log Evasion
2035| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
2036| [814] Microsoft IIS global.asa Remote Information Disclosure
2037| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
2038| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
2039| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
2040| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
2041| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
2042| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
2043| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
2044| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
2045| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
2046| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
2047| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
2048| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
2049| [473] Microsoft IIS Multiple .cnf File Information Disclosure
2050| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
2051| [470] Microsoft IIS Form_JScript.asp XSS
2052| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
2053| [436] Microsoft IIS Unicode Remote Command Execution
2054| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
2055| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
2056| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
2057| [308] Microsoft IIS Malformed File Extension URL DoS
2058| [285] Microsoft IIS repost.asp File Upload
2059| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
2060| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
2061| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
2062| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
2063| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
2064| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
2065| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
2066| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
2067| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
2068| [98] Microsoft IIS perl.exe HTTP Path Disclosure
2069| [97] Microsoft IIS ISM.DLL HTR Request Overflow
2070| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
2071| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
2072| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
2073| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
2074| [2] Microsoft IIS ExAir search.asp Direct Request DoS
2075| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
2076| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
2077| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
2078| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
2079| [96192] Microsoft IE EUC-JP Character Encoding XSS
2080| [96191] Microsoft IE Process Integrity Level Assignment Bypass
2081| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
2082| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
2083| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
2084| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
2085| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
2086| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
2087| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
2088| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
2089| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
2090| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
2091| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
2092| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
2093| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
2094| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
2095| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
2096| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
2097| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
2098| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
2099| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
2100| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
2101| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
2102| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
2103| [94984] Microsoft IE Shift JIS Character Encoding XSS
2104| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
2105| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
2106| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
2107| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
2108| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
2109| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
2110| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
2111| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
2112| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
2113| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
2114| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
2115| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
2116| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
2117| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
2118| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
2119| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
2120| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
2121| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
2122| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2123| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
2124| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
2125| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2126| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
2127| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
2128| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
2129| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
2130| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
2131| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
2132| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
2133| [94507] Microsoft IE Infinite Loop DoS
2134| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
2135| [94127] Microsoft Office PNG File Handling Buffer Overflow
2136| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
2137| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
2138| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
2139| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
2140| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
2141| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
2142| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
2143| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
2144| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
2145| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
2146| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
2147| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
2148| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
2149| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
2150| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
2151| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
2152| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
2153| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
2154| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
2155| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
2156| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
2157| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
2158| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
2159| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
2160| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2161| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2162| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
2163| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
2164| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
2165| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
2166| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
2167| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
2168| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
2169| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
2170| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
2171| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
2172| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
2173| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
2174| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
2175| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
2176| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
2177| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
2178| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
2179| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
2180| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
2181| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2182| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
2183| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
2184| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
2185| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
2186| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
2187| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
2188| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
2189| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
2190| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
2191| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
2192| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
2193| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
2194| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
2195| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
2196| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
2197| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
2198| [92257] Microsoft IE CSS Import Handling Remote DoS
2199| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
2200| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
2201| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
2202| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
2203| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
2204| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
2205| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
2206| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
2207| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
2208| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
2209| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
2210| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
2211| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
2212| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
2213| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
2214| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
2215| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
2216| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
2217| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
2218| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
2219| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
2220| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
2221| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
2222| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
2223| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
2224| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
2225| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
2226| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
2227| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
2228| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
2229| [91150] Microsoft SharePoint Unspecified XSS
2230| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
2231| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
2232| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
2233| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
2234| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
2235| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
2236| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
2237| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
2238| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
2239| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
2240| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
2241| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
2242| [90933] Microsoft IE Arbitrary HTM File Execution
2243| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
2244| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
2245| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
2246| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
2247| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
2248| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
2249| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
2250| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
2251| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
2252| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
2253| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
2254| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
2255| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
2256| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
2257| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
2258| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
2259| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
2260| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
2261| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
2262| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
2263| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
2264| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
2265| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
2266| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
2267| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
2268| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
2269| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
2270| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
2271| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
2272| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
2273| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
2274| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
2275| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
2276| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
2277| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
2278| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
2279| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
2280| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
2281| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
2282| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
2283| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
2284| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
2285| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
2286| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
2287| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
2288| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
2289| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
2290| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
2291| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
2292| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
2293| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
2294| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
2295| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
2296| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
2297| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
2298| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
2299| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
2300| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
2301| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
2302| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
2303| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
2304| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
2305| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
2306| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
2307| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
2308| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
2309| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
2310| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
2311| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
2312| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
2313| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
2314| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
2315| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
2316| [88837] Microsoft Office Excel Memory Corruption DoS
2317| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
2318| [88811] Microsoft Visio VSD File Parsing Memory Corruption
2319| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
2320| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
2321| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
2322| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
2323| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
2324| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
2325| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2326| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
2327| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
2328| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
2329| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
2330| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
2331| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
2332| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
2333| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
2334| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
2335| [87819] Microsoft Office OneNote File Handling Memory Corruption
2336| [87273] Microsoft Office Excel XLS File Handling Overflow
2337| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
2338| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
2339| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
2340| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
2341| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
2342| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
2343| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
2344| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
2345| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
2346| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
2347| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
2348| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
2349| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
2350| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
2351| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
2352| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
2353| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
2354| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
2355| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
2356| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
2357| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
2358| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
2359| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
2360| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
2361| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
2362| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
2363| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
2364| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
2365| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
2366| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
2367| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
2368| [86732] Microsoft Office DOC File Handling Stack Overflow
2369| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
2370| [86622] Microsoft SQL Server Local Authentication Bypass
2371| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
2372| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
2373| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
2374| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
2375| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
2376| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
2377| [86057] Microsoft SQL Server Report Manager Unspecified XSS
2378| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
2379| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
2380| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
2381| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
2382| [85833] Microsoft Outlook Concealed Attachment Weakness
2383| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
2384| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
2385| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
2386| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
2387| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
2388| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
2389| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
2390| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
2391| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
2392| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
2393| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
2394| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
2395| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
2396| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
2397| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
2398| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
2399| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
2400| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
2401| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
2402| [84606] Microsoft Visio DXF File Handling Overflow
2403| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
2404| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
2405| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
2406| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
2407| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
2408| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
2409| [84599] Microsoft Windows Print Spooler Service Remote Format String
2410| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
2411| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
2412| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
2413| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
2414| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
2415| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
2416| [84553] Microsoft Help &
2417| [83860] Microsoft IE XML Data Handling Arbitrary File Access
2418| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
2419| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
2420| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
2421| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
2422| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
2423| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
2424| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
2425| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
2426| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
2427| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
2428| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
2429| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2430| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
2431| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
2432| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
2433| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
2434| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
2435| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
2436| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
2437| [83647] Microsoft SharePoint Username Unspecified XSS
2438| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
2439| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
2440| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
2441| [83439] Microsoft IE Long Unicode String Handling DoS
2442| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
2443| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
2444| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
2445| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
2446| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
2447| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
2448| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
2449| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
2450| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
2451| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
2452| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
2453| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
2454| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
2455| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
2456| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
2457| [82862] Microsoft IE EUC-JP Character Encoding XSS
2458| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
2459| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
2460| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
2461| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
2462| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
2463| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
2464| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
2465| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
2466| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
2467| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2468| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
2469| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
2470| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
2471| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
2472| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
2473| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
2474| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
2475| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
2476| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
2477| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
2478| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
2479| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
2480| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
2481| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
2482| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
2483| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
2484| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
2485| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
2486| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
2487| [81732] Microsoft Office RTF Data Handling Memory Corruption
2488| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
2489| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
2490| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
2491| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
2492| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
2493| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
2494| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
2495| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
2496| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
2497| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
2498| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
2499| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
2500| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
2501| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
2502| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
2503| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
2504| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
2505| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
2506| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
2507| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
2508| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
2509| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
2510| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
2511| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
2512| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
2513| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
2514| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
2515| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
2516| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
2517| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
2518| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
2519| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
2520| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
2521| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
2522| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
2523| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
2524| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
2525| [80173] Microsoft IE Unspecified Overflow
2526| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
2527| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
2528| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
2529| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
2530| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
2531| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
2532| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
2533| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
2534| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
2535| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
2536| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
2537| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
2538| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
2539| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
2540| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
2541| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
2542| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
2543| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
2544| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
2545| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
2546| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
2547| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
2548| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
2549| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
2550| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
2551| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
2552| [79192] Microsoft IE Javascript Dialog Origin Spoofing
2553| [79186] Microsoft IE onunload Location Field Overwrite
2554| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
2555| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
2556| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
2557| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
2558| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
2559| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
2560| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
2561| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
2562| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
2563| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
2564| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
2565| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
2566| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
2567| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
2568| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
2569| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
2570| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
2571| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
2572| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
2573| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
2574| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
2575| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
2576| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
2577| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
2578| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
2579| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
2580| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
2581| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
2582| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
2583| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
2584| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
2585| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
2586| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
2587| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
2588| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
2589| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
2590| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
2591| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
2592| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
2593| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
2594| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
2595| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
2596| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
2597| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
2598| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
2599| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
2600| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
2601| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
2602| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
2603| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
2604| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
2605| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
2606| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
2607| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
2608| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
2609| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
2610| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
2611| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
2612| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
2613| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
2614| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
2615| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
2616| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
2617| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
2618| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
2619| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
2620| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
2621| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
2622| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
2623| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
2624| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
2625| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
2626| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
2627| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
2628| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
2629| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
2630| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
2631| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
2632| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
2633| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
2634| [75393] Microsoft SharePoint Unspecified URI XSS
2635| [75391] Microsoft SharePoint Contact Details XSS
2636| [75390] Microsoft SharePoint EditForm.aspx XSS
2637| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
2638| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
2639| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
2640| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
2641| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
2642| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
2643| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
2644| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
2645| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
2646| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
2647| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
2648| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
2649| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
2650| [75250] Microsoft IE Unspecified Remote Code Execution
2651| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
2652| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
2653| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
2654| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
2655| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
2656| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
2657| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
2658| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
2659| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
2660| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
2661| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
2662| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
2663| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
2664| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
2665| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
2666| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
2667| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
2668| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
2669| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
2670| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
2671| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
2672| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
2673| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
2674| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
2675| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
2676| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
2677| [74396] Microsoft Report Viewer Control Unspecified XSS
2678| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
2679| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
2680| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
2681| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
2682| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
2683| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
2684| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
2685| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
2686| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
2687| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
2688| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
2689| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
2690| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
2691| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
2692| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
2693| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
2694| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
2695| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
2696| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
2697| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
2698| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
2699| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
2700| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
2701| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
2702| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
2703| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
2704| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
2705| [73602] Microsoft Windows nsiproxy.sys Local DoS
2706| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
2707| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
2708| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
2709| [72960] Microsoft SMB Client Response Handling Remote Code Execution
2710| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
2711| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
2712| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
2713| [72953] Microsoft IE MIME Sniffing Information Disclosure
2714| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
2715| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
2716| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
2717| [72949] Microsoft IE Drag and Drop Information Disclosure
2718| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
2719| [72947] Microsoft IE Time Element Memory Corruption
2720| [72946] Microsoft IE Drag and Drop Memory Corruption
2721| [72944] Microsoft IE SafeHTML Function XSS
2722| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
2723| [72942] Microsoft IE Link Properties Handling Memory Corruption
2724| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
2725| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
2726| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
2727| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
2728| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
2729| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
2730| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
2731| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
2732| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
2733| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
2734| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
2735| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
2736| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
2737| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
2738| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
2739| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
2740| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
2741| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
2742| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
2743| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
2744| [72696] Microsoft Reader AOLL Chunk Array Overflow
2745| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
2746| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
2747| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
2748| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
2749| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
2750| [72680] Microsoft IE UTF-7 Local Redirection XSS
2751| [72679] Microsoft IE Tags javascript:[jscodz] XSS
2752| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
2753| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
2754| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
2755| [72672] Microsoft Windows AppFix systest.sdb Local DoS
2756| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
2757| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
2758| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
2759| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
2760| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
2761| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
2762| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
2763| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
2764| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
2765| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
2766| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
2767| [71777] Microsoft IE Frame Tag Handling Information Disclosure
2768| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
2769| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
2770| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
2771| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
2772| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
2773| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
2774| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
2775| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
2776| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
2777| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
2778| [71765] Microsoft Office Excel File Validation Record Handling Overflow
2779| [71761] Microsoft Office Excel File Handling Memory Corruption
2780| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
2781| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
2782| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
2783| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
2784| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
2785| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
2786| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
2787| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
2788| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
2789| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
2790| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
2791| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
2792| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
2793| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
2794| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
2795| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
2796| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
2797| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
2798| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
2799| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
2800| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
2801| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
2802| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
2803| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
2804| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
2805| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
2806| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
2807| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
2808| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
2809| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
2810| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
2811| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
2812| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
2813| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
2814| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
2815| [71724] Microsoft IE Layouts Handling Memory Corruption
2816| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
2817| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
2818| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
2819| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
2820| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
2821| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
2822| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
2823| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
2824| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
2825| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
2826| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
2827| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
2828| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
2829| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
2830| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
2831| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
2832| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
2833| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
2834| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
2835| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
2836| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
2837| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
2838| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
2839| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
2840| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
2841| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
2842| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
2843| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
2844| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
2845| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
2846| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
2847| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
2848| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
2849| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
2850| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
2851| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
2852| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
2853| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
2854| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
2855| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
2856| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
2857| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
2858| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
2859| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
2860| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
2861| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
2862| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
2863| [69828] Microsoft IE Recursive Select Element Remote Code Execution
2864| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
2865| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
2866| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
2867| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
2868| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
2869| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
2870| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
2871| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
2872| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
2873| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
2874| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
2875| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
2876| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
2877| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
2878| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
2879| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
2880| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
2881| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
2882| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
2883| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
2884| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
2885| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
2886| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
2887| [69804] Microsoft Office PICT Image Converter Overflow
2888| [69803] Microsoft Office CGM Image Converter Overflow
2889| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
2890| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
2891| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
2892| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
2893| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
2894| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
2895| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
2896| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
2897| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
2898| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
2899| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
2900| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
2901| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
2902| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
2903| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
2904| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
2905| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
2906| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
2907| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
2908| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
2909| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
2910| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
2911| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
2912| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
2913| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
2914| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
2915| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
2916| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
2917| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
2918| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
2919| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
2920| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
2921| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
2922| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
2923| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
2924| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
2925| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
2926| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
2927| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
2928| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
2929| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
2930| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
2931| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
2932| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
2933| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
2934| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
2935| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
2936| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
2937| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
2938| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
2939| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
2940| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
2941| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
2942| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
2943| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
2944| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
2945| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
2946| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
2947| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
2948| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
2949| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
2950| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
2951| [68548] Microsoft IE / SharePoint Unspecified XSS
2952| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
2953| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
2954| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
2955| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
2956| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
2957| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
2958| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
2959| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
2960| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
2961| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
2962| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
2963| [68438] Microsoft XSS Filter Library Bypass
2964| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
2965| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
2966| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
2967| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
2968| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
2969| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
2970| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
2971| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
2972| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
2973| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
2974| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
2975| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
2976| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
2977| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
2978| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
2979| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
2980| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
2981| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
2982| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
2983| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
2984| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
2985| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
2986| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
2987| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
2988| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
2989| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
2990| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
2991| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
2992| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
2993| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
2994| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
2995| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
2996| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
2997| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
2998| [67463] Microsoft IE location.replace Address Bar Spoofing
2999| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
3000| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
3001| [67258] Microsoft ClickOnce MITM Weakness
3002| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
3003| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
3004| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
3005| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
3006| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
3007| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
3008| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
3009| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
3010| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
3011| [67000] Microsoft IE boundElements Property Handling Memory Corruption
3012| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
3013| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
3014| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
3015| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
3016| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
3017| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
3018| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
3019| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
3020| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
3021| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
3022| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
3023| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
3024| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
3025| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
3026| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
3027| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
3028| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
3029| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
3030| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
3031| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
3032| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
3033| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
3034| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
3035| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
3036| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
3037| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
3038| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
3039| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
3040| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
3041| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
3042| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
3043| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
3044| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
3045| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
3046| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
3047| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
3048| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
3049| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
3050| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
3051| [65502] Microsoft IE Unspecified DoS
3052| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
3053| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
3054| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
3055| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
3056| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
3057| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
3058| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
3059| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
3060| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
3061| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
3062| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
3063| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
3064| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
3065| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
3066| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
3067| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
3068| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
3069| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
3070| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
3071| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
3072| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
3073| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
3074| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
3075| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
3076| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
3077| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
3078| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
3079| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
3080| [65213] Microsoft IE HTML Element Handling Memory Corruption
3081| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
3082| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
3083| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
3084| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
3085| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
3086| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
3087| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
3088| [64952] Microsoft IE img Tag Hijacking Weakness
3089| [64944] Microsoft Dynamics GP Default System Password
3090| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
3091| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
3092| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
3093| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
3094| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
3095| [64828] Microsoft IE history go ActiveX Overflow DoS
3096| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
3097| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
3098| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
3099| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
3100| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
3101| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
3102| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
3103| [64533] Microsoft IE document.createElement NULL Dereference DoS
3104| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
3105| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
3106| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
3107| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
3108| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
3109| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
3110| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
3111| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
3112| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
3113| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
3114| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
3115| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
3116| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
3117| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
3118| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
3119| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
3120| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
3121| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
3122| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
3123| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
3124| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
3125| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
3126| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
3127| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
3128| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
3129| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
3130| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
3131| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
3132| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
3133| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
3134| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
3135| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
3136| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
3137| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
3138| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
3139| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
3140| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
3141| [63334] Microsoft IE Post Encoding Information Disclosure
3142| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
3143| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
3144| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
3145| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
3146| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
3147| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
3148| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
3149| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
3150| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
3151| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
3152| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
3153| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
3154| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
3155| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
3156| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
3157| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
3158| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
3159| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
3160| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
3161| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
3162| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
3163| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
3164| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
3165| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
3166| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
3167| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
3168| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
3169| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3170| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
3171| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
3172| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
3173| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
3174| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
3175| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
3176| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
3177| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
3178| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
3179| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
3180| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
3181| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
3182| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
3183| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
3184| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
3185| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
3186| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
3187| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
3188| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
3189| [62239] Microsoft Office Powerpoint File Path Handling Overflow
3190| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
3191| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
3192| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
3193| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
3194| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
3195| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
3196| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
3197| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
3198| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
3199| [61911] Microsoft IE Table Layout Reuse Memory Corruption
3200| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
3201| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
3202| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
3203| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
3204| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
3205| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
3206| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
3207| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
3208| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
3209| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
3210| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
3211| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
3212| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
3213| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
3214| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
3215| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
3216| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
3217| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
3218| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
3219| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
3220| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
3221| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
3222| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
3223| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
3224| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
3225| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
3226| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
3227| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
3228| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
3229| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
3230| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
3231| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
3232| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
3233| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
3234| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
3235| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
3236| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
3237| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
3238| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
3239| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
3240| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
3241| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
3242| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
3243| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
3244| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
3245| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
3246| [59957] Microsoft Windows SMB Response Handling Remote DoS
3247| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
3248| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
3249| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
3250| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
3251| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
3252| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
3253| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
3254| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
3255| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
3256| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
3257| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
3258| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
3259| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
3260| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
3261| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
3262| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
3263| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
3264| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
3265| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
3266| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
3267| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
3268| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
3269| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
3270| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
3271| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
3272| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
3273| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
3274| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
3275| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
3276| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
3277| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
3278| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
3279| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
3280| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
3281| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
3282| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
3283| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
3284| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
3285| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
3286| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
3287| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
3288| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
3289| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
3290| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
3291| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
3292| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
3293| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
3294| [59263] Microsoft IE IMG Tag width Handling DoS
3295| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
3296| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
3297| [59258] Microsoft Exchange ACL Modification Update Weakness
3298| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
3299| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
3300| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
3301| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
3302| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
3303| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
3304| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
3305| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
3306| [58870] Microsoft Office BMP Image Color Processing Overflow
3307| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
3308| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
3309| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
3310| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
3311| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
3312| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
3313| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3314| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
3315| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
3316| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
3317| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
3318| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
3319| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
3320| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
3321| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
3322| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
3323| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
3324| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
3325| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
3326| [58843] Microsoft Windows Media Player ASF Handling Overflow
3327| [58817] Microsoft IE Nested marquee Tag Handling DoS
3328| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
3329| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
3330| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
3331| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
3332| [58399] Microsoft IE window.print Function Loop Remote DoS
3333| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
3334| [58350] Microsoft Patterns &
3335| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
3336| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
3337| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
3338| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
3339| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
3340| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
3341| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
3342| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
3343| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
3344| [57742] Microsoft SQL Cleartext User Passwords Disclosure
3345| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
3346| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
3347| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
3348| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
3349| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
3350| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
3351| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
3352| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
3353| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
3354| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
3355| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
3356| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
3357| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
3358| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
3359| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
3360| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
3361| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
3362| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
3363| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
3364| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
3365| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
3366| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
3367| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
3368| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
3369| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
3370| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
3371| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
3372| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
3373| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
3374| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
3375| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
3376| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
3377| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
3378| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
3379| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
3380| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
3381| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
3382| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
3383| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
3384| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
3385| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
3386| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
3387| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
3388| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
3389| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
3390| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
3391| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
3392| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
3393| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
3394| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
3395| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
3396| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
3397| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
3398| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
3399| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
3400| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
3401| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
3402| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
3403| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
3404| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
3405| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
3406| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
3407| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
3408| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
3409| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
3410| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
3411| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
3412| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
3413| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
3414| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
3415| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
3416| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
3417| [54955] Microsoft Office Excel Malformed Records Handling Overflow
3418| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
3419| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
3420| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
3421| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
3422| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
3423| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
3424| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
3425| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
3426| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
3427| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
3428| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
3429| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
3430| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
3431| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
3432| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
3433| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
3434| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
3435| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
3436| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
3437| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
3438| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
3439| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
3440| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
3441| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
3442| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
3443| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
3444| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
3445| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
3446| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
3447| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
3448| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
3449| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
3450| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
3451| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
3452| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
3453| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
3454| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
3455| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
3456| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
3457| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
3458| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
3459| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
3460| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
3461| [54183] Microsoft IE Unprintable Character Document Handling DoS
3462| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
3463| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
3464| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
3465| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
3466| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
3467| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
3468| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
3469| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
3470| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
3471| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
3472| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
3473| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
3474| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
3475| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
3476| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
3477| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
3478| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
3479| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
3480| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
3481| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
3482| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
3483| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
3484| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
3485| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
3486| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
3487| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
3488| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
3489| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
3490| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
3491| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
3492| [52694] Microsoft Windows Media Player Malformed GET Request DoS
3493| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
3494| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
3495| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
3496| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
3497| [52689] Microsoft Word Document Handling HTML Object Tag DoS
3498| [52688] Microsoft Word Document Handling HTML Object Tag XSS
3499| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
3500| [52685] Microsoft Windows FTP Client Multiple Command Overflows
3501| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
3502| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
3503| [52682] Microsoft Windows Explorer ZIP Handler DoS
3504| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
3505| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
3506| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
3507| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
3508| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
3509| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
3510| [52666] Microsoft IE Malformed file:// URI Handling DoS
3511| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
3512| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
3513| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
3514| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
3515| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
3516| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
3517| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
3518| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
3519| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
3520| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
3521| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
3522| [52517] Microsoft Windows DNS Server Query Validation Spoofing
3523| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
3524| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
3525| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
3526| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
3527| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
3528| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
3529| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
3530| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
3531| [51433] Microsoft Windows Crafted CHM File Handling Overflow
3532| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
3533| [51277] Microsoft Excel HTML Tag Interpretation XSS
3534| [51259] Microsoft IE onload=screen["
3535| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
3536| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
3537| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
3538| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
3539| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
3540| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
3541| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
3542| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
3543| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
3544| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
3545| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
3546| [50598] Microsoft Office Word Table Property Handling Overflow
3547| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
3548| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
3549| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
3550| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
3551| [50592] Microsoft Office Word Malformed Value Memory Corruption
3552| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
3553| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
3554| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
3555| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
3556| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
3557| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
3558| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
3559| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
3560| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
3561| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
3562| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
3563| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
3564| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
3565| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
3566| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
3567| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
3568| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
3569| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
3570| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
3571| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
3572| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
3573| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
3574| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
3575| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
3576| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
3577| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
3578| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
3579| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
3580| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
3581| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
3582| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
3583| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
3584| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
3585| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
3586| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
3587| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
3588| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
3589| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
3590| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
3591| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
3592| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
3593| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
3594| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
3595| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
3596| [49385] Microsoft ASP.NET Request Validation <
3597| [49384] Microsoft ASP.NET Request Validation <
3598| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
3599| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
3600| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
3601| [49118] Microsoft IE HTML Object Handling Memory Corruption
3602| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
3603| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
3604| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
3605| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
3606| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
3607| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
3608| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
3609| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
3610| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
3611| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
3612| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
3613| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
3614| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
3615| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
3616| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
3617| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
3618| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3619| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
3620| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
3621| [48837] Microsoft Windows Vista Page Fault Handling DoS
3622| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
3623| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
3624| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
3625| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
3626| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
3627| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
3628| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
3629| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
3630| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
3631| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
3632| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
3633| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
3634| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
3635| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
3636| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3637| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
3638| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
3639| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
3640| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
3641| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
3642| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
3643| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
3644| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
3645| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
3646| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
3647| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
3648| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
3649| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
3650| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
3651| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
3652| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
3653| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
3654| [47410] Microsoft Office Excel connections.xml Password String Persistence
3655| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
3656| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
3657| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
3658| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
3659| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
3660| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
3661| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
3662| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
3663| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
3664| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
3665| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
3666| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
3667| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
3668| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
3669| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
3670| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
3671| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
3672| [46935] Microsoft IE Pop Up Blocker Multiple Issues
3673| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
3674| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
3675| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
3676| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
3677| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
3678| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
3679| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
3680| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
3681| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
3682| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
3683| [46772] Microsoft SQL Server Convert Function Overflow
3684| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
3685| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
3686| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
3687| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
3688| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
3689| [46630] Microsoft IE location Window Object Handling XSS
3690| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
3691| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
3692| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
3693| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
3694| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
3695| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
3696| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
3697| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
3698| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
3699| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
3700| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
3701| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
3702| [45826] Microsoft IE Local Zone Saved File URI XSS
3703| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
3704| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
3705| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
3706| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
3707| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
3708| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
3709| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
3710| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
3711| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
3712| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
3713| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
3714| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
3715| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
3716| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
3717| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
3718| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
3719| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
3720| [45262] Microsoft ISA Server Host Header Log File Content Injection
3721| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
3722| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
3723| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
3724| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
3725| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
3726| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
3727| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
3728| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
3729| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
3730| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
3731| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
3732| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
3733| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
3734| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
3735| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
3736| [44979] Microsoft SQL Server Blank sa Password Set Weakness
3737| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
3738| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
3739| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
3740| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
3741| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
3742| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
3743| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
3744| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
3745| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
3746| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
3747| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
3748| [44303] Microsoft IE body Tag Infinite Loop DoS
3749| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
3750| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
3751| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
3752| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
3753| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
3754| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
3755| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
3756| [44205] Microsoft IE Data Stream Handling Memory Corruption
3757| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
3758| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
3759| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
3760| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
3761| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
3762| [44150] Microsoft Access Crafted MDB File Handling Overflow
3763| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
3764| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
3765| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
3766| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
3767| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
3768| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
3769| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
3770| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
3771| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
3772| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
3773| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
3774| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
3775| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
3776| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
3777| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
3778| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
3779| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
3780| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
3781| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
3782| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
3783| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
3784| [42724] Microsoft Excel Style Record Handling Memory Corruption
3785| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
3786| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
3787| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
3788| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
3789| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
3790| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
3791| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
3792| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
3793| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
3794| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
3795| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
3796| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
3797| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
3798| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
3799| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
3800| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
3801| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
3802| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
3803| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
3804| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
3805| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
3806| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
3807| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
3808| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
3809| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
3810| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
3811| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
3812| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
3813| [41155] Microsoft Windows Hardware-enforced DEP Bypass
3814| [41154] Microsoft Windows XP EFS Cleartext Password Storage
3815| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
3816| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
3817| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
3818| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
3819| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
3820| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
3821| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
3822| [41060] Microsoft .NET Unspecified XSS Filter Bypass
3823| [41059] Microsoft Windows ARP Saturation Remote DoS
3824| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
3825| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
3826| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
3827| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
3828| [41041] Microsoft IE Mouse Click self.resizeTo DoS
3829| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
3830| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
3831| [41035] Microsoft IE onload Localhost DoS
3832| [41026] Microsoft IE GET Request Overflow
3833| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
3834| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
3835| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
3836| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
3837| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
3838| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
3839| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
3840| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
3841| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
3842| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
3843| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
3844| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
3845| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
3846| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
3847| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
3848| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
3849| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
3850| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
3851| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
3852| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
3853| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
3854| [39121] Microsoft IE DHTML Object Memory Corruption
3855| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
3856| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
3857| [39118] Microsoft IE Object setExpression Function Memory Corruption
3858| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
3859| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
3860| [38955] Microsoft IE history.length Variable History Disclosure
3861| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
3862| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
3863| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
3864| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
3865| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
3866| [38495] Microsoft IE Outlook Express Address Book Activex DoS
3867| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
3868| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
3869| [38488] Microsoft ISA Server File Extension Filter Bypass
3870| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
3871| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
3872| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
3873| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
3874| [38212] Microsoft IE document.open() Function Address Bar Spoofing
3875| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
3876| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
3877| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
3878| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
3879| [37637] Microsoft Windows Crafted HLP File Overflow
3880| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
3881| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
3882| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
3883| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
3884| [37632] Microsoft Word Unspecified Memory Corruption
3885| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
3886| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
3887| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
3888| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
3889| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
3890| [37626] Microsoft IE Unspecified Address Bar Spoofing
3891| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
3892| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
3893| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
3894| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
3895| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
3896| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
3897| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
3898| [36936] Microsoft Visual Basic VBP File Handling Overflow
3899| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
3900| [36934] Microsoft Agent URL Handling Remote Code Execution
3901| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
3902| [36400] Microsoft IE HTML FTP Credential Disclosure
3903| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
3904| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
3905| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
3906| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
3907| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
3908| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
3909| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
3910| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
3911| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
3912| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
3913| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
3914| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
3915| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
3916| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
3917| [36385] Microsoft Windows Media Player Skin File Handling Overflow
3918| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
3919| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
3920| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
3921| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
3922| [36147] Microsoft IE Zone Domain Specification DoS
3923| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
3924| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
3925| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
3926| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
3927| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
3928| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
3929| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
3930| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
3931| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
3932| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
3933| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
3934| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
3935| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
3936| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
3937| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
3938| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
3939| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
3940| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
3941| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
3942| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
3943| [35637] Microsoft Windows Unspecified Remote Code Execution
3944| [35568] Microsoft IE Script Variable Length DoS
3945| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
3946| [35352] Microsoft IE navcancl.htm res: URI Phishing
3947| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
3948| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
3949| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
3950| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
3951| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
3952| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
3953| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
3954| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
3955| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
3956| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
3957| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
3958| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
3959| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
3960| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
3961| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
3962| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
3963| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
3964| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
3965| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
3966| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
3967| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
3968| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
3969| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
3970| [34401] Microsoft IE Property Method Handling Memory Corruption
3971| [34400] Microsoft IE Uninitialized Object Memory Corruption
3972| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
3973| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
3974| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
3975| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
3976| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
3977| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
3978| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
3979| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
3980| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
3981| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
3982| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
3983| [34387] Microsoft Word Data Array Handling Remote Code Execution
3984| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
3985| [34385] Microsoft Word Macro Content Arbitrary Code Execution
3986| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
3987| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
3988| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
3989| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
3990| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
3991| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
3992| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
3993| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
3994| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
3995| [34077] Microsoft IE navcancl.htm res: URI XSS
3996| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
3997| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
3998| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
3999| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
4000| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
4001| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
4002| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
4003| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
4004| [33667] Microsoft Windows Vista Persistent Established Teredo Address
4005| [33666] Microsoft Windows Vista Teredo nonce Spoofing
4006| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
4007| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
4008| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
4009| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
4010| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
4011| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
4012| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
4013| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
4014| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
4015| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
4016| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
4017| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
4018| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
4019| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
4020| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
4021| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
4022| [33271] Microsoft Word Crafted Frame CSRF
4023| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
4024| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
4025| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
4026| [32630] Microsoft IE Key Press Event Focus Redirection
4027| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
4028| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
4029| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
4030| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
4031| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
4032| [32624] Microsoft IE mhtml Overflow DoS
4033| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
4034| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
4035| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
4036| [32087] Microsoft IE onunload Event Address Bar Spoofing
4037| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
4038| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
4039| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
4040| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
4041| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
4042| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
4043| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
4044| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
4045| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
4046| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
4047| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
4048| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
4049| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
4050| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
4051| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
4052| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
4053| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
4054| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
4055| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
4056| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
4057| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
4058| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
4059| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
4060| [31645] Microsoft Windows DNS Recursive Query DoS
4061| [31333] Microsoft IE Image File Embedded Content XSS
4062| [31332] Microsoft IE Scrollbar CSS Property DoS
4063| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
4064| [31330] Microsoft IE File:// URI src Tag IFrame DoS
4065| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
4066| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
4067| [31326] Microsoft IE HTML Table Tag style Attribute DoS
4068| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
4069| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
4070| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
4071| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
4072| [31321] Microsoft IE Javascript self.location Refresh DoS
4073| [31258] Microsoft Excel Palette Record Handling Overflow
4074| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
4075| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
4076| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
4077| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
4078| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
4079| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
4080| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
4081| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
4082| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
4083| [30997] Microsoft Windows .manifest File Handling Local DoS
4084| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
4085| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
4086| [30826] Microsoft Visual Basic Click Event Procedure Overflow
4087| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
4088| [30824] Microsoft Word Malformed String Memory Corruption
4089| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
4090| [30822] Microsoft IE A Tag Long Title Attribute DoS
4091| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
4092| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
4093| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
4094| [30818] Microsoft Windows Media Player ASF Parsing Overflow
4095| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
4096| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
4097| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
4098| [30814] Microsoft IE DHTML Script Function Memory Corruption
4099| [30813] Microsoft IE Script Error Handling Memory Corruption
4100| [30811] Microsoft Windows SNMP Service Remote Overflow
4101| [30405] Microsoft Windows Active Directory Unspecified DoS
4102| [30402] Microsoft w3wp Crafted COM Component Request DoS
4103| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
4104| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
4105| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
4106| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
4107| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
4108| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
4109| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
4110| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
4111| [30087] Microsoft IE Empty APPLET Tag DoS
4112| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
4113| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
4114| [29720] Microsoft PowerPoint Unspecified Code Execution
4115| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
4116| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
4117| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
4118| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
4119| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
4120| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
4121| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
4122| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
4123| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
4124| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
4125| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
4126| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
4127| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
4128| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
4129| [29440] Microsoft Word memmove Integer Overflow
4130| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
4131| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
4132| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
4133| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
4134| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
4135| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
4136| [29426] Microsoft XML Core Services XSLT Processing Overflow
4137| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
4138| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
4139| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
4140| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
4141| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
4142| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
4143| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
4144| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
4145| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
4146| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
4147| [29129] Microsoft IE wininet.dll Content-Type DoS
4148| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
4149| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
4150| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
4151| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
4152| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
4153| [28730] Microsoft Publisher PUB File Font Parsing Overflow
4154| [28729] Microsoft Windows Indexing Service Unspecified XSS
4155| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
4156| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
4157| [28723] Microsoft Works Malformed Works Spreadsheet DoS
4158| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
4159| [28614] Microsoft IE input/div Tag width Conflict DoS
4160| [28539] Microsoft Word 2000 Unspecified Code Execution
4161| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
4162| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
4163| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
4164| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
4165| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
4166| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
4167| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
4168| [28381] Microsoft IE ActiveX SaveFile Handling DoS
4169| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
4170| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
4171| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
4172| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
4173| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
4174| [27854] Microsoft IE Chained CSS Imports Memory Corruption
4175| [27853] Microsoft IE HTML Rendering Memory Corruption
4176| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
4177| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
4178| [27850] Microsoft IE Cross Site Window Location Information Disclosure
4179| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
4180| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
4181| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
4182| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
4183| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
4184| [27844] Microsoft Windows DNS Client Service Record Response Overflow
4185| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
4186| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
4187| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
4188| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
4189| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
4190| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
4191| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
4192| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
4193| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
4194| [27373] Microsoft IE Native Function Iteration NULL Dereference
4195| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
4196| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
4197| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
4198| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
4199| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
4200| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
4201| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
4202| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
4203| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
4204| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
4205| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
4206| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
4207| [27150] Microsoft Office MSO.DLL String Processing Overflow
4208| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
4209| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
4210| [27147] Microsoft Office PNG Processing Unspecified Code Execution
4211| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
4212| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
4213| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
4214| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
4215| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
4216| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
4217| [27059] Microsoft IE FolderItem Object NULL Dereference
4218| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
4219| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
4220| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
4221| [27053] Microsoft Excel Asian Language Style Option Overflow
4222| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
4223| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
4224| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
4225| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
4226| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
4227| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
4228| [26837] Microsoft IE Frameset inside Table NULL Dereference
4229| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
4230| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
4231| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
4232| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
4233| [26527] Microsoft Excel Malformed URL String Handling Overflow
4234| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
4235| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
4236| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
4237| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
4238| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
4239| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
4240| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
4241| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
4242| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
4243| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
4244| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
4245| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
4246| [26434] Microsoft JScript Object Release Memory Corruption
4247| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
4248| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
4249| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
4250| [26430] Microsoft Windows Media Player PNG Processing Overflow
4251| [26193] Microsoft NetMeeting Unspecified Remote DoS
4252| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
4253| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
4254| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
4255| [25635] Microsoft Word Unspecified Code Execution
4256| [25501] Microsoft Windows itss.dll CHM Processing Overflow
4257| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
4258| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
4259| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
4260| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
4261| [25003] Microsoft Office mailto: Arbitrary File Access
4262| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
4263| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
4264| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
4265| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
4266| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
4267| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
4268| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
4269| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
4270| [24542] Microsoft IE Unspecified Address Bar Spoofing
4271| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
4272| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
4273| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
4274| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
4275| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
4276| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
4277| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
4278| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
4279| [24208] Microsoft .NET Framework ILDASM Overflow
4280| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
4281| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
4282| [24095] Microsoft IE Arbitrary HTA File Execution
4283| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
4284| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
4285| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
4286| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
4287| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
4288| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
4289| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
4290| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
4291| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
4292| [23657] Microsoft IE ActiveX Killbit Setting Bypass
4293| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
4294| [23608] Microsoft IE Iframe Folder Delete Weakness
4295| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
4296| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
4297| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
4298| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
4299| [23307] Microsoft IE window.status Memory Leak DoS
4300| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
4301| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
4302| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
4303| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
4304| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
4305| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
4306| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
4307| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
4308| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
4309| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
4310| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
4311| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
4312| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
4313| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
4314| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4315| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4316| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4317| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4318| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
4319| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
4320| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
4321| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
4322| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
4323| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
4324| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
4325| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
4326| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
4327| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
4328| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
4329| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
4330| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
4331| [22354] Microsoft IE Malformed table datasrc Tag DoS
4332| [22351] Microsoft IE Modal Security Dialog Race Condition
4333| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
4334| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
4335| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
4336| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
4337| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
4338| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
4339| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
4340| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
4341| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
4342| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
4343| [21562] Microsoft IE CSS Crafted p Element DoS
4344| [21536] Microsoft Windows backup File Name Extension Overflow
4345| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
4346| [21510] Microsoft Windows SynAttackProtect Bypass
4347| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
4348| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
4349| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
4350| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
4351| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
4352| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
4353| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
4354| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
4355| [20497] Microsoft Windows 98SE User32.dll Icon DoS
4356| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
4357| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
4358| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
4359| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
4360| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
4361| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
4362| [20271] Microsoft IE settimeout Function Recursion DoS
4363| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
4364| [20248] Microsoft IE Embedded Content Processing XSS
4365| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
4366| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
4367| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
4368| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
4369| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
4370| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
4371| [20199] Microsoft IE Image Saturation Handling DoS
4372| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
4373| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
4374| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
4375| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
4376| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
4377| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
4378| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
4379| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
4380| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
4381| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
4382| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
4383| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
4384| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
4385| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
4386| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
4387| [19905] Microsoft Collaboration Data Objects Remote Overflow
4388| [19904] Microsoft Windows DTC Packet Relay DoS
4389| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
4390| [19902] Microsoft Windows COM+ Remote Code Execution
4391| [19901] Microsoft Windows FTP Client Arbitrary File Write
4392| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
4393| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
4394| [19898] Microsoft Windows Web View Arbitrary Script Injection
4395| [19876] Microsoft AntiSpyware Registry Extension Bypass
4396| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
4397| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
4398| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
4399| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
4400| [19796] Microsoft IE Malformed IFRAME File Source DoS
4401| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
4402| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
4403| [19662] Microsoft IE XMLHTTP HTTP Request Injection
4404| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
4405| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
4406| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
4407| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
4408| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
4409| [19089] Microsoft IE Unspecified Remote Code Execution
4410| [19029] Microsoft IE Meta Refresh Parsing Weakness
4411| [19024] Microsoft IE Automatic MIME Detection Weakness
4412| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
4413| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
4414| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
4415| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
4416| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
4417| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
4418| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
4419| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
4420| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
4421| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
4422| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
4423| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
4424| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
4425| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
4426| [18681] Microsoft Windows XP User Account Manager Hidden User
4427| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
4428| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
4429| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
4430| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
4431| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
4432| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
4433| [18607] Microsoft Windows Print Spooler Service Remote Overflow
4434| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
4435| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
4436| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
4437| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
4438| [18493] Microsoft Windows USB Device Driver Overflow
4439| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
4440| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
4441| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
4442| [18459] Microsoft ActiveSync Sync Request Saturation DoS
4443| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
4444| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
4445| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
4446| [18152] Microsoft IE Image File Handling Remote DoS
4447| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
4448| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
4449| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
4450| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
4451| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
4452| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
4453| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
4454| [17829] Microsoft Office .doc Font Parsing Overflow
4455| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
4456| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
4457| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
4458| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
4459| [17707] Microsoft Front Page Malformed HTML Edit DoS
4460| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
4461| [17671] Microsoft Site Server viewcode.asp Information Disclosure
4462| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
4463| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
4464| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
4465| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
4466| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
4467| [17665] Microsoft Site Server Default.asp XSS
4468| [17664] Microsoft Site Server remind.asp Information Disclosure
4469| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
4470| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
4471| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
4472| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
4473| [17659] Microsoft Site Server vs.asp Information Disclosure
4474| [17658] Microsoft Site Server default.asp Information Disclosure
4475| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
4476| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
4477| [17655] Microsoft Site Server DSN.asp Information Disclosure
4478| [17654] Microsoft Site Server driver.asp Information Disclosure
4479| [17653] Microsoft Site Server domain.asp Information Disclosure
4480| [17652] Microsoft Site Server findserver.asp Information Disclosure
4481| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
4482| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
4483| [17342] Microsoft ISA Server Basic Credentials Exposure
4484| [17334] Microsoft IE Script Code Obfuscation (Ghost)
4485| [17314] Microsoft IE XML Redirect Information Disclosure
4486| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
4487| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
4488| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
4489| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
4490| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
4491| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
4492| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
4493| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
4494| [17305] Microsoft Windows HTML Help (CHM) File Overflow
4495| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
4496| [17218] Microsoft IE Stack Overflow Saturation DoS
4497| [17217] Microsoft IE Embedded File Recursion DoS
4498| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
4499| [17159] Microsoft IE Malformed FTP URL DoS
4500| [17158] Microsoft IE Crafted BMP Size Setting DoS
4501| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
4502| [17094] Microsoft IE window() Function Arbitrary Code Execution
4503| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
4504| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
4505| [16827] Microsoft WGA Multiple Method Validation Bypass
4506| [16814] Microsoft Word mcw File Processing Overflow
4507| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
4508| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
4509| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
4510| [16342] Microsoft IE Cross Site Mouse Click Disclosure
4511| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
4512| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
4513| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
4514| [15757] Microsoft SQL Server sa Account Default Null Password
4515| [15739] Microsoft Windows Malformed Image Rendering DoS
4516| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
4517| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
4518| [15480] Microsoft Outlook From Header Comma Parsing Failure
4519| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
4520| [15470] Microsoft Word Unspecified Overflow
4521| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
4522| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
4523| [15466] Microsoft IE Content Advisor Overflow
4524| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
4525| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
4526| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
4527| [15462] Microsoft Windows CSRSS Local Overflow
4528| [15461] Microsoft Windows Object Management Malformed Request DoS
4529| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
4530| [15459] Microsoft Windows Font Processing Local Privilege Escalation
4531| [15458] Microsoft Windows Message Queuing Remote Overflow
4532| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
4533| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
4534| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
4535| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
4536| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
4537| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
4538| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
4539| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
4540| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
4541| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
4542| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
4543| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
4544| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
4545| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
4546| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
4547| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
4548| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
4549| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
4550| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
4551| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
4552| [15219] Microsoft IE XML Object Arbitrary File Access
4553| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
4554| [15217] Microsoft IE input Tag Rendering DoS
4555| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
4556| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
4557| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
4558| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
4559| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
4560| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
4561| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
4562| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
4563| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
4564| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
4565| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
4566| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
4567| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
4568| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
4569| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
4570| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
4571| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
4572| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
4573| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
4574| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
4575| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
4576| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
4577| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
4578| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
4579| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
4580| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
4581| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
4582| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
4583| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
4584| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
4585| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
4586| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
4587| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
4588| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
4589| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
4590| [13609] Microsoft Windows Hyperlink Object Library Overflow
4591| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
4592| [13607] Microsoft IE CDF Cross-Domain Code Execution
4593| [13606] Microsoft IE createControlRange() Function Heap Corruption
4594| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
4595| [13604] Microsoft IE Drag-and-Drop File Injection
4596| [13602] Microsoft Windows OLE Input Validation Overflow
4597| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
4598| [13600] Microsoft Windows SMB Transaction Data Overflow
4599| [13599] Microsoft Windows License Logging Service Overflow
4600| [13597] Microsoft Windows Media Player PNG File Overflow
4601| [13596] Microsoft Windows XP Named Pipe Username Disclosure
4602| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
4603| [13594] Microsoft Office XP URL Overflow
4604| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
4605| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
4606| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
4607| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
4608| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
4609| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
4610| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
4611| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
4612| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
4613| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
4614| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
4615| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
4616| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
4617| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
4618| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
4619| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
4620| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
4621| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
4622| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
4623| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
4624| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
4625| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
4626| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
4627| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
4628| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
4629| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
4630| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
4631| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
4632| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
4633| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
4634| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
4635| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
4636| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
4637| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
4638| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
4639| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
4640| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
4641| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
4642| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
4643| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
4644| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
4645| [13330] Microsoft Windows HKLM Registry Key Locking DoS
4646| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
4647| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
4648| [13258] Microsoft IE Excel File Address Bar Spoofing
4649| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
4650| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
4651| [13132] Microsoft IE %20 URL Spoofing
4652| [13040] Microsoft IE Javascript Load Local File Path Disclosure
4653| [13020] Microsoft Windows XP RPC Cache Memory Leak
4654| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
4655| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
4656| [12862] Microsoft IE USER32.CharLowerA Exception DoS
4657| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
4658| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
4659| [12832] Microsoft Windows Indexing Service Query Overflow
4660| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
4661| [12709] Microsoft HTML Parser Malformed Javascript DoS
4662| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
4663| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
4664| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
4665| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
4666| [12625] Microsoft Windows winhlp32.exe Overflow
4667| [12624] Microsoft Windows Kernel ANI File Parsing DoS
4668| [12623] Microsoft Windows LoadImage API Overflow
4669| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
4670| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
4671| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
4672| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
4673| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
4674| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
4675| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
4676| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
4677| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
4678| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
4679| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
4680| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
4681| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
4682| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
4683| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
4684| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
4685| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
4686| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
4687| [12299] Microsoft IE FTP URL Arbitrary Command Injection
4688| [12277] Microsoft IE sysimage: Local File Existence Disclosure
4689| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
4690| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
4691| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
4692| [12163] Microsoft IE Save Picture As File Extension Spoofing
4693| [12123] Microsoft Windows ipconfig.exe Overflow
4694| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
4695| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
4696| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
4697| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
4698| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
4699| [11956] Microsoft Outlook/Express Message body NUL Character DoS
4700| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
4701| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
4702| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
4703| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
4704| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
4705| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
4706| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
4707| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
4708| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
4709| [11946] Microsoft IE/Outlook Malformed XBM File DoS
4710| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
4711| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
4712| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
4713| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
4714| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
4715| [11940] Microsoft Outlook Blocked Attachment Access
4716| [11939] Microsoft Outlook Attachment Spoofed Content Type
4717| [11938] Microsoft Outlook Express Attachment Filename Overflow
4718| [11937] Microsoft Outlook 98 Hidden Drive Access
4719| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
4720| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
4721| [11918] Microsoft IE execCommand() File Extension Spoofing
4722| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
4723| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
4724| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
4725| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
4726| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
4727| [11799] Microsoft Windows SMB Signing Group Policy Modification
4728| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
4729| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
4730| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
4731| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
4732| [11580] Microsoft IE res: URI Handler File Existence Disclosure
4733| [11479] Microsoft Windows NT Double Dot Samba Client DoS
4734| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
4735| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
4736| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
4737| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
4738| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
4739| [11473] Microsoft Windows NT Messenger Service Long Username DoS
4740| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
4741| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
4742| [11470] Microsoft Windows NT Help File Utility Overflow
4743| [11469] Microsoft Windows NT Malformed File Image Header DoS
4744| [11468] Microsoft Windows NT IOCTL Function DoS
4745| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
4746| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
4747| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
4748| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
4749| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
4750| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
4751| [11423] Microsoft Outlook Malformed Header DoS
4752| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
4753| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
4754| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
4755| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
4756| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
4757| [11416] Microsoft Outlook/Express Blank Header DoS
4758| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
4759| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
4760| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
4761| [11274] Microsoft IE "
4762| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
4763| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
4764| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
4765| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
4766| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
4767| [11170] Microsoft IE iframe Malformed base href DoS
4768| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
4769| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
4770| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
4771| [11158] Microsoft Windows NT Malformed Token Ring DoS
4772| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
4773| [11152] Microsoft IE Malformed HTML Style DoS
4774| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
4775| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
4776| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
4777| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
4778| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
4779| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
4780| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
4781| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
4782| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
4783| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
4784| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
4785| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
4786| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
4787| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
4788| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
4789| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
4790| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
4791| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
4792| [10975] Microsoft Windows NT Winpopup Long Username DoS
4793| [10967] Microsoft IE Javascript User Homepage Address Spoofing
4794| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
4795| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
4796| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
4797| [10935] Microsoft Word Macro Security Model Bypass
4798| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
4799| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
4800| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
4801| [10756] Microsoft MSN heartbeat.ocx Component Overflow
4802| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
4803| [10735] Microsoft Excel Virus Warning Mechanism Bypass
4804| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
4805| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
4806| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
4807| [10709] Microsoft IE SSL Cached Content Spoofing
4808| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
4809| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
4810| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
4811| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
4812| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
4813| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
4814| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
4815| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
4816| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
4817| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
4818| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
4819| [10693] Microsoft Windows Unspecified Kernel Local DoS
4820| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
4821| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
4822| [10690] Microsoft Windows Management APIs Local Privilege Escalation
4823| [10689] Microsoft Windows NetDDE Remote Overflow
4824| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
4825| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
4826| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
4827| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
4828| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
4829| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
4830| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
4831| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
4832| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
4833| [10615] Microsoft Windows NT linux smbmount Request DoS
4834| [10614] Microsoft Windows NT %systemroot% Path Inclusion
4835| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
4836| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
4837| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
4838| [10606] Microsoft Windows LSA NULL Policy Handle DoS
4839| [10604] Microsoft Windows NT PATH Working Directory Inclusion
4840| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
4841| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
4842| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
4843| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
4844| [10379] Microsoft SQL Server Large Query DoS
4845| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
4846| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
4847| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
4848| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
4849| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
4850| [10183] Microsoft SQL Server xp_sprintf Function DoS
4851| [10181] Microsoft SQL Server formatmessage Function DoS
4852| [10166] Microsoft SQL Server raiserror Function DoS
4853| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
4854| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
4855| [10157] Microsoft SQL Server BULK INSERT Query Overflow
4856| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
4857| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
4858| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
4859| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
4860| [10152] Microsoft SQL Server xp_printstatements Function Overflow
4861| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
4862| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
4863| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
4864| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
4865| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
4866| [10146] Microsoft SQL Server xp_sprintf Function Overflow
4867| [10145] Microsoft SQL Server formatmessage Function Overflow
4868| [10144] Microsoft SQL Server raiserror Function Overflow
4869| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
4870| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
4871| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
4872| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
4873| [10139] Microsoft SQL Server Agent Arbitrary File Creation
4874| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
4875| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
4876| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
4877| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
4878| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
4879| [10132] Microsoft SQL Server Authentication Function Remote Overflow
4880| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
4881| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
4882| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
4883| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
4884| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
4885| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
4886| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
4887| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
4888| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
4889| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
4890| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
4891| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
4892| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
4893| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
4894| [9671] Microsoft IE onUnload Address Bar Spoofing
4895| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
4896| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
4897| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
4898| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
4899| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
4900| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
4901| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
4902| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
4903| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
4904| [9348] Microsoft Windows NT Non-NTFS File System Insecure
4905| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
4906| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
4907| [9172] Microsoft IE File/Directory Existence Disclosure
4908| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
4909| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
4910| [9141] Microsoft Windows File Icon Spoofing
4911| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
4912| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
4913| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
4914| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
4915| [8941] Microsoft IE Merlin.speak Function CPU DoS
4916| [8706] Solaris mibiisa MIB Parsing Remote Overflow
4917| [8428] Microsoft NetMeeting Malformed Packets DoS
4918| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
4919| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
4920| [8335] Microsoft IE mshtml.dll Null Pointer DoS
4921| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
4922| [8277] Microsoft IE Malformed GIF Double-free DoS
4923| [8276] Microsoft IE Malformed BMP Overflow
4924| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
4925| [8243] Microsoft SMS Port 2702 DoS
4926| [8224] Microsoft IE CSS Memory Corruption DoS
4927| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
4928| [8210] Microsoft HTML Control Large Form Field DoS
4929| [8161] Microsoft Windows NT Invalid User Privileges
4930| [8160] Microsoft Windows NT File/Directory Invalid Permissions
4931| [8148] Microsoft IE Arbitrary File Write (What a Drag)
4932| [8129] Microsoft IE CSS Malformed div element DoS
4933| [8112] Microsoft Windows NT Weak Account Password Policy
4934| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
4935| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
4936| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
4937| [7963] Microsoft IE parent.window.open location.cache Script Execution
4938| [7951] Microsoft SMS Remote Control Client DoS
4939| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
4940| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
4941| [7914] Microsoft IE .FOLDER File Type Execution
4942| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
4943| [7912] Microsoft IE showHelp() Arbitrary File Execution
4944| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
4945| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
4946| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
4947| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
4948| [7905] Microsoft IE ie5setup.exe Multple Service Disable
4949| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
4950| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
4951| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
4952| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
4953| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
4954| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
4955| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
4956| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
4957| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
4958| [7895] Microsoft IE MS-DOS Device Name URL DoS
4959| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
4960| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
4961| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
4962| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
4963| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
4964| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
4965| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
4966| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
4967| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
4968| [7885] Microsoft Java Implementation Applet Tag DoS
4969| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
4970| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
4971| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
4972| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
4973| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
4974| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
4975| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
4976| [7877] Microsoft Java Virtual Machine Class.forName Overflow
4977| [7876] Microsoft IE .isp File Arbitrary Command Execution
4978| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
4979| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
4980| [7866] Microsoft IE Frame Spoofing Content Injection
4981| [7864] Microsoft IE URL History FTP Credential Disclosure
4982| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
4983| [7862] Microsoft IE User DAT File History Disclosure
4984| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
4985| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
4986| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
4987| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
4988| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
4989| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
4990| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
4991| [7854] Microsoft IE Chinese Character Scrolling DoS
4992| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
4993| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
4994| [7851] Microsoft IE Multiple Form Field DoS
4995| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
4996| [7849] Microsoft IE Javascript location.replace Recursive DoS
4997| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
4998| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
4999| [7846] Microsoft IE PNG Invalid Length Code DoS
5000| [7845] Microsoft IE Encoded URL Information Disclosure
5001| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
5002| [7843] Microsoft IE URLMON.DLL Multiple Overflows
5003| [7842] Microsoft IE File Upload Control Arbitrary File Access
5004| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
5005| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
5006| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
5007| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
5008| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
5009| [7836] Microsoft IE EMBED Tag Overflow
5010| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
5011| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
5012| [7833] Microsoft IE/OE res: Protocol Library Overflow
5013| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
5014| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
5015| [7830] Microsoft IE mk: URL Handling Remote Overflow
5016| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
5017| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
5018| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
5019| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
5020| [7825] Microsoft IE Domain Frame Arbitrary File Access
5021| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
5022| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
5023| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
5024| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
5025| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
5026| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
5027| [7818] Microsoft IE Page Redirect Authentication Credential Leak
5028| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
5029| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
5030| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
5031| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
5032| [7803] Microsoft Windows showHelp Arbitrary Code Execution
5033| [7802] Microsoft IE File Download Extension Spoofing
5034| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
5035| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
5036| [7798] Microsoft Windows Task Scheduler Remote Overflow
5037| [7793] Microsoft Outlook Express Header Validation DoS
5038| [7779] Microsoft IE AnchorClick Cross Zone Scripting
5039| [7778] Microsoft Outlook Window Opener Script Execution
5040| [7777] Microsoft Windows Media Control Preview Script Execution
5041| [7776] Microsoft IE Download Window Filename Filetype Spoofing
5042| [7775] Microsoft IE Channel Link Script Injection
5043| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
5044| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
5045| [7762] Microsoft Java Virtual Machine Cross-Site Communication
5046| [7739] Microsoft IE plugin.ocx Load() Method Overflow
5047| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
5048| [7608] Microsoft Index Server Internet Data Query Path Disclosure
5049| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
5050| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
5051| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
5052| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
5053| [7293] Microsoft Plus! Compressed Folder Password Disclosure
5054| [7202] Microsoft PowerPoint 2000 File Loader Overflow
5055| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
5056| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
5057| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
5058| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
5059| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
5060| [7117] Microsoft Windows RPC Locator Remote Overflow
5061| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
5062| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
5063| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
5064| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
5065| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
5066| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
5067| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
5068| [6965] Microsoft ISA Server 2000 SSL Packet DoS
5069| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
5070| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
5071| [6931] Microsoft IE/Outlook Double Null Character DoS
5072| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
5073| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
5074| [6742] Microsoft DirectPlay Packet Validation DoS
5075| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
5076| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
5077| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
5078| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
5079| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
5080| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
5081| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
5082| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
5083| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
5084| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
5085| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
5086| [6079] Microsoft Outlook Remote XML Loading
5087| [6074] Microsoft Windows Me HSC hcp:// URL XSS
5088| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
5089| [6031] Microsoft Exchange Multiple SMTP Command DoS
5090| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
5091| [5998] Microsoft Outlook Predictable File Caching
5092| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
5093| [5968] Microsoft Windows ARP Packet DoS
5094| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
5095| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
5096| [5936] Microsoft SMTP Service 4xx Error Code DoS
5097| [5887] Microsoft Access 97 Cleartext Password Storage
5098| [5884] Microsoft Site Server ASP Upload Remote Command Execution
5099| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
5100| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
5101| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
5102| [5694] Microsoft IE Address Bar URL Spoofing
5103| [5687] Microsoft Windows IE and Explorer Share Name Overflow
5104| [5686] Microsoft Windows Telnet Service Account Information Disclosure
5105| [5608] Microsoft NetMeeting Malformed String DoS
5106| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
5107| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
5108| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
5109| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
5110| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
5111| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
5112| [5390] Microsoft Exchange NTLM Null Session Mail Relay
5113| [5357] Microsoft Multiple Products for Mac File URL Overflow
5114| [5356] Microsoft IE for Mac Local AppleScript Invocation
5115| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
5116| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
5117| [5343] Microsoft SQL Server SQLXML root Parameter XSS
5118| [5342] Microsoft IE Malformed Web Page Zone Spoofing
5119| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
5120| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
5121| [5261] Microsoft Windows ASN.1 Double Free Code Execution
5122| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
5123| [5259] Microsoft Windows Negotiate SSP Code Execution
5124| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
5125| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
5126| [5256] Microsoft Windows Unspecified H.323 Code Execution
5127| [5255] Microsoft Windows Management Privilege Escalation
5128| [5254] Microsoft Windows Utility Manager Privilege Escalation
5129| [5253] Microsoft Windows Help and Support Center Command Execution
5130| [5252] Microsoft Windows Metafile Code Execution
5131| [5251] Microsoft Windows Winlogon Command Execution
5132| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
5133| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
5134| [5248] Microsoft Windows LSASS Remote Overflow
5135| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
5136| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
5137| [5245] Microsoft Windows RPCSS Large Length Field DoS
5138| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
5139| [5241] Microsoft Jet Database Engine Remote Code Execution
5140| [5179] Microsoft Windows 2000 microsoft-ds DoS
5141| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
5142| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
5143| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
5144| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
5145| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
5146| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
5147| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
5148| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
5149| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
5150| [5134] Microsoft IE Reference Local HTML Resource Script Execution
5151| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
5152| [5129] Microsoft IE Download File Origin Spoofing
5153| [5126] Microsoft BackOffice Authentication Bypass
5154| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
5155| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
5156| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
5157| [4951] Microsoft IE CLASSID Remote DoS
5158| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
5159| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
5160| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
5161| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
5162| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
5163| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
5164| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
5165| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
5166| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
5167| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
5168| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
5169| [4654] iisCart2000 File Upload
5170| [4627] Microsoft IE Text Control Overflow
5171| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
5172| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
5173| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
5174| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
5175| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
5176| [4186] Microsoft IE Cookie Path Traversal
5177| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
5178| [4168] Microsoft Outlook 2002 mailto URI Script Injection
5179| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
5180| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
5181| [3903] Microsoft Windows WINS Server Remote Overflow
5182| [3902] Microsoft Windows ASN.1 Library Integer Overflow
5183| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
5184| [3879] Microsoft IE File Identification Variant
5185| [3791] Microsoft IE Travel Log Arbitrary Script Execution
5186| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
5187| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
5188| [3501] Microsoft FrontPage form_results Information Disclosure
5189| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
5190| [3457] Microsoft MDAC Broadcast Reply Overflow
5191| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
5192| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
5193| [3384] Microsoft FrontPage htimage.exe Overflow
5194| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
5195| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
5196| [3381] Microsoft FrontPage imagemap.exe Overflow
5197| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
5198| [3313] Microsoft Word Form Protection Bypass
5199| [3307] Microsoft IE showHelp() Zone Restriction Bypass
5200| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
5201| [3225] Microsoft IE for Mac Information Disclosure
5202| [3213] SecureIIS Error Page Information Disclosure
5203| [3212] SecureIIS Encoded URI Arbitrary File Access
5204| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
5205| [3209] SecureIIS HTTP Request Overflow Protection Bypass
5206| [3195] Microsoft Exchange OWA REFERER Header XSS
5207| [3184] IISShield HTTP Request Bypass Ruleset
5208| [3183] iisPROTECT Encoded URL Authentication Bypass
5209| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
5210| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
5211| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
5212| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
5213| [3108] Microsoft Office 98 Macintosh Information Disclosure
5214| [3106] Microsoft Windows Password Authentication Security Point of Failure
5215| [3104] Microsoft IE PPC Overwrite Arbitrary Files
5216| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
5217| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
5218| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
5219| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
5220| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
5221| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
5222| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
5223| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
5224| [3066] Microsoft IE Custom HTTP Errors Script Injection
5225| [3065] Microsoft IE Unparsable XML File XSS
5226| [3056] Microsoft IE MSN/Alexa Information Leak
5227| [3055] Microsoft IE Spoofed URL
5228| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
5229| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
5230| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
5231| [3051] Microsoft IE MHT Web Archive Overflow
5232| [3050] Microsoft IE dragDrop Method Local File Reading
5233| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
5234| [3036] Microsoft IE dynsrc File Information Leak
5235| [3035] Microsoft WebBrowser Control t:video File Execution
5236| [3034] Microsoft IE JavaScript script src Local File Enumeration
5237| [3033] Microsoft IE Content Type/Disposition File Execution
5238| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
5239| [3031] Microsoft IE document.Open Same Origin Policy Violation
5240| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
5241| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
5242| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
5243| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
5244| [3010] Microsoft IE OWC XMLURL File Existence Verification
5245| [3009] Microsoft IE OWC Load File Existence Verification
5246| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
5247| [3007] Microsoft IE OWC LoadText Read Arbitrary File
5248| [3006] Microsoft IE OWC Script Execution
5249| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
5250| [3004] Microsoft IE Gopher Client Overflow
5251| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
5252| [3002] Microsoft IE File Extension Dot Parsing
5253| [3001] Microsoft IE XP HCP URI Handler File Deletion
5254| [2999] Microsoft IE Powerpoint Mouse-Over Execute
5255| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
5256| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
5257| [2996] Microsoft IE Object Zone Redirection
5258| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
5259| [2994] Microsoft IE (NewWindow).location.assign Save Reference
5260| [2993] Microsoft IE % URL Encoding XSS
5261| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
5262| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
5263| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
5264| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
5265| [2985] Microsoft IE execCommand Object Caching
5266| [2984] Microsoft IE getElementsByTagName Object Caching
5267| [2983] Microsoft IE getElementsByName Object Caching
5268| [2982] Microsoft IE getElementById Object Caching
5269| [2981] Microsoft IE elementFromPoint Object Caching
5270| [2980] Microsoft IE createRange Object Caching
5271| [2979] Microsoft IE external Object Caching
5272| [2978] Microsoft IE showModalDialog Object Caching
5273| [2977] Microsoft IE XML Datasource Read Local Files
5274| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
5275| [2975] Microsoft IE Back Button XSS
5276| [2974] Microsoft IE/Outlook Temporary Internet File Execution
5277| [2973] Microsoft IE Third Party Plugin Rendering XSS
5278| [2972] Microsoft IE showModalDialog Script Execution
5279| [2971] Microsoft WMP File Attachment Script Execution
5280| [2970] Microsoft IE cssText Arbitrary File Access
5281| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
5282| [2968] Microsoft IE File Download Dialog Overflow
5283| [2967] Microsoft IE Object Type Property Overflow
5284| [2966] Microsoft IE BR549.DLL Overflow
5285| [2965] Microsoft IE Cache Script Execution in My Zone
5286| [2963] Microsoft IE align HTML Converter Overflow
5287| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
5288| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
5289| [2917] Microsoft Access Known Database Attack
5290| [2801] Microsoft Word and Excel Execution of Arbitrary Code
5291| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
5292| [2784] Microsoft IE Component Function Information Disclosure
5293| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
5294| [2751] Microsoft Word Macro Name Handling Overflow
5295| [2745] Microsoft HTML Help Control Privilege Escalation
5296| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
5297| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
5298| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
5299| [2679] Microsoft Outlook Web Access XSS
5300| [2678] Microsoft Windows Overflow in ListBox and
5301| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
5302| [2675] Microsoft Windows HCP protocol Overflow
5303| [2674] Microsoft Exchange SMTP Extended Request Overflow
5304| [2670] Microsoft Windows RPC Race Condition DoS
5305| [2657] Microsoft Windows Message Queuing Service Heap Overflow
5306| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
5307| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
5308| [2642] Microsoft Windows Unauthorised Thread Termination
5309| [2592] Microsoft PowerPoint Modify Protection Bypass
5310| [2572] Microsoft BizTalk Server Insecure Permissions
5311| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
5312| [2544] Microsoft ASP.NET Request Validation Bypass
5313| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
5314| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
5315| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
5316| [2508] Microsoft Visual Basic for Applications Buffer Overflow
5317| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
5318| [2506] Microsoft Word/Works Automated Macro Execution
5319| [2453] Microsoft IE My Computer Zone Caching Issue
5320| [2451] Microsoft IE Object Data Header Type Safe File Execution
5321| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
5322| [2368] IISShield Crafted HTTP Request Filtering Bypass
5323| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
5324| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
5325| [2320] Microsoft ISA Server HTTP Error Handler XSS
5326| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
5327| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
5328| [2298] Microsoft ISA Server Error Page XSS
5329| [2291] Microsoft IE DOM Script Source Recursive DoS
5330| [2288] Microsoft Utility Manager Local Privilege Escalation
5331| [2283] Microsoft Exchange OWA Execute Arbitrary Code
5332| [2262] Microsoft Windows Media Player DHTML Local Zone Access
5333| [2247] Microsoft Windows Media Services Remote Command Execution #2
5334| [2244] Microsoft Windows 2000 ShellExecute() API Let
5335| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
5336| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
5337| [2100] Microsoft Windows RPC DCOM Interface Overflow
5338| [2096] Microsoft ISA Server SurfControl Web Filter
5339| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
5340| [2073] Microsoft Windows XP Network Share Provider Overflow
5341| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
5342| [2061] Microsoft Outlook HTML Mail Script Execution
5343| [2060] Microsoft IE Known Local File Script Execution
5344| [2051] Microsoft Windows User Shell Buffer Overflow
5345| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
5346| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
5347| [2046] Microsoft IE Forced Script Execution
5348| [2045] Microsoft IE HTML Document Directive Overflow
5349| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
5350| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
5351| [2041] Microsoft Office for Macintosh Network PID Checker DoS
5352| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
5353| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
5354| [2008] Microsoft IE Same Origin Policy Violation
5355| [2004] Microsoft IE Cross-frame Remote File Access
5356| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
5357| [1992] Microsoft IE Cookie Disclosure
5358| [1990] Microsoft Windows Terminal Services False IP Address
5359| [1982] Microsoft IE about: URI XSS
5360| [1978] Microsoft IE for Mac OS Download Execution
5361| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
5362| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
5363| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
5364| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
5365| [1957] Microsoft Exchange OWA Malformed Request DoS
5366| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
5367| [1934] Microsoft ISA Server Invalid URL Error Message XSS
5368| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
5369| [1932] Microsoft ISA Server H.323 Memory Leak DoS
5370| [1928] Microsoft Windows NNTP Malformed Post DoS
5371| [1915] Microsoft Windows Media Player .NSC File Overflow
5372| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
5373| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
5374| [1867] Microsoft Word Document Macro Execution
5375| [1864] Microsoft SQL Server Administrator Cached Connection
5376| [1861] Microsoft Windows Telnet Local System Call DoS
5377| [1860] Microsoft Windows Telnet Service Handle Leak DoS
5378| [1859] Microsoft Windows Telnet Multiple Sessions DoS
5379| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
5380| [1856] Microsoft Exchange OWA Embedded Script Execution
5381| [1852] Microsoft Outlook Address Book Spoofing Weakness
5382| [1840] Microsoft Windows Media Player Internet Shortcut Execution
5383| [1838] Microsoft Word .asd Macro File Execution
5384| [1837] Microsoft Word RTF Template Macro Execution
5385| [1832] Microsoft IE Spoofed SSL Certificates
5386| [1831] Microsoft IE Server Certificate Validation Failure
5387| [1820] Microsoft Index Server Search Parameter Overflow
5388| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
5389| [1764] Microsoft Windows 2000 Domain Controller DoS
5390| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
5391| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
5392| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
5393| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
5394| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
5395| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
5396| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
5397| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
5398| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
5399| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
5400| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
5401| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
5402| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
5403| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
5404| [1607] Microsoft Windows 9x Invalid Driver Type DoS
5405| [1606] Microsoft IE Cached Web Credentials Disclosure
5406| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
5407| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
5408| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
5409| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
5410| [1563] Microsoft Windows / Office DLL Search Path Weakness
5411| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
5412| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
5413| [1537] Microsoft Outlook Rich Text Format Information Disclosure
5414| [1530] Microsoft Money Cleartext Password Storage
5415| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
5416| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
5417| [1502] Microsoft IE Scriptlet Rendering
5418| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
5419| [1491] Microsoft Windows 9x IPX Ping Packet DoS
5420| [1475] Microsoft Outlook/Express Cache Bypass
5421| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
5422| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
5423| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
5424| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
5425| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
5426| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
5427| [1428] Microsoft IE/Office ActiveX Object Execution
5428| [1427] Microsoft IE VBA Code Execution
5429| [1399] Microsoft Windows 2000 Windows Station Access
5430| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
5431| [1369] Microsoft SQL Server DTS Password Disclosure
5432| [1368] Microsoft Media Encoder Request Parsing Local DoS
5433| [1358] Microsoft Windows NT HostAnnouncement DoS
5434| [1342] Microsoft IE DocumentComplete() Cross Frame Access
5435| [1341] Microsoft IE ActiveX Combined Component Attributes
5436| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
5437| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
5438| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
5439| [1297] Microsoft Windows 2000 Active Directory Object Attribute
5440| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
5441| [1272] Microsoft Excel XLM Arbitrary Macro Execution
5442| [1268] Microsoft Windows TCP/IP Printing Service DoS
5443| [1257] Microsoft Windows Media License Manager DoS
5444| [1251] Microsoft Windows MS DOS Device Name DoS
5445| [1250] Microsoft SQL Server Non-Validated Query
5446| [1244] Microsoft Clip Art Buffer Overflow
5447| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
5448| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
5449| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
5450| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
5451| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
5452| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
5453| [1188] Microsoft CIS IMAP Server Remote Overflow
5454| [1166] Microsoft Windows NT LsaLookupSids() DoS
5455| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
5456| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
5457| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
5458| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
5459| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
5460| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
5461| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
5462| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
5463| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
5464| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
5465| [1076] Microsoft Windows IP Source Routing
5466| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
5467| [1069] Microsoft IE Import/Export Favorites
5468| [1056] Microsoft Java Virtual Machine Sandbox Bypass
5469| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
5470| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
5471| [1046] Microsoft Windows telnet.exe Argument Overflow
5472| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
5473| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
5474| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
5475| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
5476| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
5477| [1010] Microsoft Windows NT Malformed LSA Request DoS
5478| [967] Microsoft Windows NT WINS Service Malformed Data DoS
5479| [945] Microsoft Windows 95/98 SMB Authentication Replay
5480| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
5481| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
5482| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
5483| [922] Microsoft NetMeeting Clipboard Remote Overflow
5484| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
5485| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
5486| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
5487| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
5488| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
5489| [863] Microsoft Exchange Malformed Mail Attribute DoS
5490| [858] Microsoft Windows NCM Handler Local Privilege Elevation
5491| [852] Microsoft Exchange EHLO Long Hostname Overflow
5492| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
5493| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
5494| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
5495| [773] Microsoft Windows 2000 Group Policy File Lock DoS
5496| [772] Microsoft Windows Multiple UNC Provider Request Overflow
5497| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
5498| [736] Microsoft Windows SMB Enumeration Information Disclosure
5499| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
5500| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
5501| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
5502| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
5503| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
5504| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
5505| [665] Microsoft Windows 95 Online Registration Information Disclosure
5506| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
5507| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
5508| [601] Microsoft Exchange Server LDAP Bind Function Overflow
5509| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
5510| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
5511| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
5512| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
5513| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
5514| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
5515| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
5516| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
5517| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
5518| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
5519| [457] Microsoft Exchange Malformed MIME Header DoS
5520| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
5521| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
5522| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
5523| [423] Microsoft Windows File Share Password Protection Bypass
5524| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
5525| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
5526| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
5527| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
5528| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
5529| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
5530| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
5531| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
5532| [334] Microsoft Windows Registry: Permission to Modify Common Paths
5533| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
5534| [331] Microsoft Windows Remote Registry Access
5535| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
5536| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
5537| [304] Microsoft Windows NT service pack level via remote registry access
5538| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
5539| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
5540| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
5541| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
5542| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
5543| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
5544| [129] Microsoft Windows NT FTP 'guest' Account
5545| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
5546| [68] Microsoft FrontPage Extensions .pwd File Permissions
5547| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
5548|_
5549Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5550OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
5551No OS matches for host
5552Uptime guess: 0.001 days (since Sun Dec 22 15:05:00 2019)
5553Network Distance: 22 hops
5554TCP Sequence Prediction: Difficulty=255 (Good luck!)
5555IP ID Sequence Generation: Randomized
5556Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
5557
5558TRACEROUTE (using port 80/tcp)
5559HOP RTT ADDRESS
55601 61.23 ms 10.252.204.1
55612 91.26 ms 104.245.145.177
55623 91.32 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
55634 91.31 ms 38.32.56.202
55645 91.36 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
55656 91.41 ms be-122-0.ibr02.yto20.ntwk.msn.net (104.44.20.167)
55667 91.39 ms be-5-0.ibr02.ch2.ntwk.msn.net (104.44.17.147)
55678 91.44 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
55689 91.42 ms be-5-0.ibr02.ch2.ntwk.msn.net (104.44.17.147)
556910 ...
557011 51.64 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
557112 ... 21
557222 253.36 ms 104.43.254.102
5573
5574NSE: Script Post-scanning.
5575Initiating NSE at 15:06
5576Completed NSE at 15:06, 0.00s elapsed
5577Initiating NSE at 15:06
5578Completed NSE at 15:06, 0.00s elapsed
5579#######################################################################################################################################
5580Version: 1.11.13-static
5581OpenSSL 1.0.2-chacha (1.0.2g-dev)
5582
5583Connected to 104.43.254.102
5584
5585Testing SSL server 104.43.254.102 on port 443 using SNI name 104.43.254.102
5586
5587 TLS Fallback SCSV:
5588Server does not support TLS Fallback SCSV
5589
5590 TLS renegotiation:
5591Secure session renegotiation supported
5592
5593 TLS Compression:
5594Compression disabled
5595
5596 Heartbleed:
5597TLS 1.2 not vulnerable to heartbleed
5598TLS 1.1 not vulnerable to heartbleed
5599TLS 1.0 not vulnerable to heartbleed
5600
5601 Supported Server Cipher(s):
5602Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
5603Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
5604Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
5605Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
5606Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5607Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5608Accepted TLSv1.2 256 bits AES256-GCM-SHA384
5609Accepted TLSv1.2 128 bits AES128-GCM-SHA256
5610Accepted TLSv1.2 256 bits AES256-SHA256
5611Accepted TLSv1.2 128 bits AES128-SHA256
5612Accepted TLSv1.2 256 bits AES256-SHA
5613Accepted TLSv1.2 128 bits AES128-SHA
5614Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5615Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5616Accepted TLSv1.1 256 bits AES256-SHA
5617Accepted TLSv1.1 128 bits AES128-SHA
5618Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5619Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5620Accepted TLSv1.0 256 bits AES256-SHA
5621Accepted TLSv1.0 128 bits AES128-SHA
5622
5623 SSL Certificate:
5624Signature Algorithm: sha256WithRSAEncryption
5625RSA Key Strength: 2048
5626
5627Subject: *.azurewebsites.net
5628Altnames: DNS:*.azurewebsites.net, DNS:*.scm.azurewebsites.net, DNS:*.azure-mobile.net, DNS:*.scm.azure-mobile.net, DNS:*.sso.azurewebsites.net
5629Issuer: Microsoft IT TLS CA 5
5630
5631Not valid before: Sep 24 02:18:56 2019 GMT
5632Not valid after: Sep 24 02:18:56 2021 GMT
5633#######################################################################################################################################
5634Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-22 15:12 EST
5635NSE: Loaded 47 scripts for scanning.
5636NSE: Script Pre-scanning.
5637Initiating NSE at 15:12
5638Completed NSE at 15:12, 0.00s elapsed
5639Initiating NSE at 15:12
5640Completed NSE at 15:12, 0.00s elapsed
5641Initiating Parallel DNS resolution of 1 host. at 15:12
5642Completed Parallel DNS resolution of 1 host. at 15:12, 0.02s elapsed
5643Initiating UDP Scan at 15:12
5644Scanning 104.43.254.102 [15 ports]
5645Completed UDP Scan at 15:12, 3.52s elapsed (15 total ports)
5646Initiating Service scan at 15:12
5647Scanning 13 services on 104.43.254.102
5648Service scan Timing: About 7.69% done; ETC: 15:33 (0:19:36 remaining)
5649Completed Service scan at 15:13, 102.59s elapsed (13 services on 1 host)
5650Initiating OS detection (try #1) against 104.43.254.102
5651Retrying OS detection (try #2) against 104.43.254.102
5652Initiating Traceroute at 15:13
5653Completed Traceroute at 15:13, 7.20s elapsed
5654Initiating Parallel DNS resolution of 1 host. at 15:13
5655Completed Parallel DNS resolution of 1 host. at 15:13, 0.00s elapsed
5656NSE: Script scanning 104.43.254.102.
5657Initiating NSE at 15:13
5658Completed NSE at 15:14, 7.15s elapsed
5659Initiating NSE at 15:14
5660Completed NSE at 15:14, 1.05s elapsed
5661Nmap scan report for 104.43.254.102
5662Host is up (0.052s latency).
5663
5664PORT STATE SERVICE VERSION
566553/udp open|filtered domain
566667/udp open|filtered dhcps
566768/udp open|filtered dhcpc
566869/udp open|filtered tftp
566988/udp open|filtered kerberos-sec
5670123/udp open|filtered ntp
5671137/udp filtered netbios-ns
5672138/udp filtered netbios-dgm
5673139/udp open|filtered netbios-ssn
5674161/udp open|filtered snmp
5675162/udp open|filtered snmptrap
5676389/udp open|filtered ldap
5677500/udp open|filtered isakmp
5678|_ike-version: ERROR: Script execution failed (use -d to debug)
5679520/udp open|filtered route
56802049/udp open|filtered nfs
5681Too many fingerprints match this host to give specific OS details
5682
5683TRACEROUTE (using port 137/udp)
5684HOP RTT ADDRESS
56851 ... 4
56865 107.09 ms 10.252.204.1
56876 107.08 ms 10.252.204.1
56887 107.08 ms 10.252.204.1
56898 107.08 ms 10.252.204.1
56909 107.07 ms 10.252.204.1
569110 107.08 ms 10.252.204.1
569211 105.36 ms 10.252.204.1
569312 ... 15
569416 61.23 ms 10.252.204.1
569517 ... 20
569621 81.86 ms 10.252.204.1
569722 ...
569823 70.62 ms 10.252.204.1
569924 ... 27
570028 76.01 ms 10.252.204.1
570129 ...
570230 37.35 ms 10.252.204.1
5703
5704NSE: Script Post-scanning.
5705Initiating NSE at 15:14
5706Completed NSE at 15:14, 0.00s elapsed
5707Initiating NSE at 15:14
5708Completed NSE at 15:14, 0.00s elapsed
5709#######################################################################################################################################
5710 Anonymous JTSEC #OpChili Full Recon #23